Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
denial-of-service attack
mode-switching DoS attacks
k-connected graph
k-connected communication topology
DoS attack modes
distributed secure control
distributed event-triggered controller
distributed controller independent
distributed control schemes
denial-of-service (DoS) attacks
Decentralized Control
construction algorithm
CPSS
attack graphs
denial-of-service attacks
cyberattack
distributed control
telecommunication control
Communication channels
Laplace equations
Predictive Metrics
telecommunication network topology
Topology
security problem
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
computer network security
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Research on Automatic Generation and Analysis Technology of Network Attack Graph
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Network Security Reinforcement
security of data
Resiliency
pubcrawl
Probability-based Network Vulnerability Measurement
probability
Predictive Metrics
optimization
optimisation
network vulnerability index
network security reinforcement algorithm
Microelectronics
network security metrics
network attack graph
graph theory
edge authority attack graph
dependence attack graph
composability
automatic generation
attack target asset value
attack graphs
security
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
biblio
Dynamic Graphs on the GPU
Submitted by aekwall on Mon, 01/11/2021 - 1:31pm
graphics processing units
data deletion
graph
gpu
dynamic updates
dynamic graph data structures
dynamic
deletion speedups
adjacency lists
hash table
Scalability
Gold
arrays
Sparse matrices
maintenance engineering
privacy
data structures
graph theory
pubcrawl
Memory management
biblio
Approximate Probabilistic Security for Networked Multi-Robot Systems
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
multipoint optimization
security
Robot sensing systems
robot operating systems
Resiliency
resilience
pubcrawl
probability
Probabilistic logic
policy-based governance
optimisation
optimal subset
online optimization
Observers
networked multirobot systems
networked control systems
approximate probabilistic security
multi-robot systems
MRS
lower bound estimate
left invertiblility
Human Factors
Human behavior
graph theory
exact probability
disjoint path sets
control system security
computational complexity
combinatorial optimization problem
Boolean functions
binary decision diagrams
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »