Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
android
Correlation
Cyber-Infrastructure
graph analysis
graph theory
Human behavior
malware
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Mathematical Modeling of Group Authentication Based on Isogeny of Elliptic Curves
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
message authentication
Task Analysis
Scalability
Resiliency
quantum computing
public key cryptography
pubcrawl
Protocols
postquantum systems
Metrics
authentication
mathematical modeling
isogeny graphs
Isogeny
hierarchical group authentication scheme
graph theory
Elliptic curves
Elliptic curve cryptography
Complexity theory
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network
Submitted by aekwall on Mon, 03/04/2019 - 10:45am
internet
attribution
space-ground integration information network
pattern matching
network attacks
cyber security knowledge graph
cyber attack attribution
Correlation
computer security
tools
security of data
Metrics
graph theory
composability
pubcrawl
Human behavior
cyber-attack
Ontologies
human-in-the-loop security center paradigm
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
biblio
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Submitted by aekwall on Mon, 02/18/2019 - 12:57pm
real-time crowdsourced maps
large-scale simulations
location privacy
map systems
Mobile handsets
one-time physical co-location
online social networks
points-of-interest
privacy
privacy attacks
large proximity graphs
Roads
security attacks
single Sybil device
software-based Sybil devices
strong location authentication
sybil attacks
virtual vehicles
Waze
Metrics
cartography
data privacy
telecommunication security
mobile computing
real-time systems
pubcrawl
composability
Sybil attack
Accidents
automatic user traffic rerouting
traffic engineering computing
co-location edges
crowdsourced mobile mapping services
crowdsourcing
false congestion
ghost riders
Global Positioning System
Google
Google team
graph theory
biblio
One Quantifiable Security Evaluation Model for Cloud Computing Platform
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
public cloud
visualization
visual graphs
visual display module
System recovery
Security Visualization
security view
security situation
security scanning engine
security recovery engine
security of data
security
Resiliency
resilience
quantifiable security evaluation model
quantifiable evaluation
API
pubcrawl
private cloud
multiple clouds
mixed cloud
maintenance engineering
graph theory
G-Cloud platform
Engines
dynamic security scanning score
Computational modeling
cloud resources
cloud computing platform
Cloud Computing
application security
application program interfaces
biblio
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
IMCGS
security
search problems
Resiliency
resilience
pubcrawl
path loss
optimal attack path analysis
Optimal attack path
network security
Monte Carlo methods
Metrics
k-zero attack graph
improved Monte Carlo graph search algorithm
Improved Monte Carlo Graph Search
ACO
Heuristic algorithms
graph theory
Games
dynamic programming
CVSS value
computer network security
composability
Backpropagation
attack graphs
attack graph
Artificial Neural Networks
ant colony optimization algorithm
ant colony optimisation
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »