Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A Spectral Graph Sparsification Approach to Scalable Vectorless Power Grid Integrity Verification
Submitted by grigby1 on Wed, 05/09/2018 - 2:47pm
power supply circuits
vectorless verification framework
Vectorless verification
spectral power grid sparsifiers
spectral graph theory
spectral graph sparsification
Sensitivity
scalable verification
scalable vectorless power grid integrity verification
scalable multilevel integrity verification framework
Scalability
Resiliency
resilience
pubcrawl
algebraic multigrid
power grids
power grid designs
Optimization methods
nanoscale power delivery networks
Nanoscale devices
Metrics
Laplace equations
Integrated circuit modeling
integrated circuit design
graph-theoretic algebraic multigrid algorithmic framework
graph theory
graph sparsification
Compositionality
biblio
Research on modeling for network security policy confliction based on network topology
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
network topology
telecommunication security
telecommunication network topology
security policy model
security policies
security
Routing
pubcrawl
Protocols
Policy consistency
Peer-to-peer computing
campus network
network security policy confliction
network security field
network modeling
network devices
IP networks
graph theory
distributed network system
Conflict checking
Communication networks
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
A Markov Game Theoritic Approach for Power Grid Security
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Metrics
user authentication information steal
two-player zero-sum Markov game theoretic approach
security of data
Scalability
Resiliency
resilience
pubcrawl
power system security
power grids
Power Grid Security
power engineering computing
advanced persistent threat
Markov processes
Markov game
information and communication technology
Human behavior
graph theory
Games
game theory
cyber-attack
Companies
Analytical models
advanced persistent threats
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »