Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A Layered Graphical Model for Mission Attack Impact Analysis
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Human behavior
unanticipated cyber activities
sockets
Scalability
Resiliency
resilience
pubcrawl
NIST National Vulnerability Database
mission attack impact analysis
military missions
Metrics
Legged locomotion
layered graphical model
Human Factors
attack activities
graph theory
graph levels
Forensics
forensic investigators
Digital Forensics
Cyber Dependencies
Conferences
Computational modeling
Compositionality
Common Vulnerability Scoring System
business missions
business data processing
attack logs
biblio
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
PHP application vulnerabilities
web applications
vulnerability scanner
Syntactics
Structured Query Language
SQL injection
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Programming Language
programming
code property graphs
PHP
Open Source Software
interprocedural analysis technique
internet
information flow analysis
Human Factors
human factor
Human behavior
graph theory
graph database
Databases
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
A Graph Model for Enhancing Situational Awareness in Power Systems
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Regression tree analysis
power grid operation
power grid security assessment
power grid vulnerability analysis
power grids
power system
power system faults
power system reliability
power system security
power transmission lines
power transmission reliability
pubcrawl
power flow information
Resiliency
security
Security analysis
security issues
situational awareness
system operator
system threats estimation
system threats visualization
Transmission line measurements
visualization
vulnerable links
Indexes
blackout threats
cascading outages
composability
contingency selection
critical links
Decision Making
graph model
graph theory
IEEE 118-bus systems
IEEE 30-bus systems
immediate threats graph
blackout
ITG
LCI
LDG
Line Criticality Index
line dependency graph
line outage impact prediction
Line Vulnerability Index
Load flow
LVI
Metrics
online visualization
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
biblio
BMNR: Design and Implementation a Benchmark for Metrics of Network Robustness
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
big data security metrics
BMNR
Conferences
graph attack
graph generator
graph theory
Hybrid electric vehicles
Metrics
network robustness
pubcrawl
Resiliency
robustness metric evaluation
Scalability
social networking (online)
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
overlay networks
uniform routing table
telecommunication network routing
skip graph
routing algorithm
Routing
Resiliency
query forwarding
pubcrawl
Peer-to-peer computing
Partitioning algorithms
arrays
overlay network
order preserving linear hashing
linear hashing
Limiting
hop reduction
hash algorithms
graph theory
distributed key-value store
Distributed databases
Compositionality
biblio
An Intrusion Tolerance Scheme for a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
malicious activity
XML
Wireless communication
transaction serializability
transaction processing
transaction dependency graph
subtransactions
serializability
security of data
security
Safety
running system serialization
Resiliency
pubcrawl
processing node
malicious transactions
CDC
intrusion tolerance scheme
intrusion tolerance
graph theory
estimation
dependency
Decision Making
databases environment cloud
Databases
database management systems
Data models
concurrent access
composability
Cloud of databases environment
Cloud Computing
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »