Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security assessment
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
AVAMAT: AntiVirus and malware analysis tool
Submitted by grigby1 on Tue, 01/23/2018 - 2:52pm
MetaDefender
VirusTotal
security tool
security assessment
Resiliency
pubcrawl
privacy
OS
operating systems (computers)
operating system platforms
Metrics
AntiVirus products
malware detection capabilities
Malware Analysis
Iron
invasive software
Human behavior
Erbium
AVAMAT
AV
antivirus-and-malware analysis tool
antivirus software
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
file
Sadeghi_Taxonomy_Qual_Comparison_DG.pdf
Submitted by Jamie Presken on Mon, 01/09/2017 - 10:05am
Android platform
CMU
Jan'17
program analysis
security assessment
Taxonomy and Survey
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Mon, 01/09/2017 - 10:03am
Android platform
CMU
Jan'17
program analysis
security assessment
Taxonomy and Survey
CMU
Jan'17
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 10:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
High performance computation tools for real-time security assessment
Submitted by BrandonB on Thu, 04/30/2015 - 1:19pm
software tools
power system
power system security
power system transient stability
power transmission control
predictor-corrector methods
proactive operator decision-support
SCADA
SCADA systems
security assessment
power engineering computing
sparse linear solver
SuperLU_MT library
synchrophasor measurement data
system control actions
thread-parallelization
transient stability analysis
transmission operators
U.S. Department of Energy grant
EPRI
computation tools
computer software
computing machine
contingency analysis
CPU time
data visualisation
DE-OE0000628
Decision Making
dynamic simulation software
Adams-Bashforth-Moulton predictor-corrector method
ETMSP performance
extended transient midterm simulation program
hybrid measurement-based-simulation-based security-assessment tool
hybrid simulation-measurement-based tools
integration
MPI-based parallelization
operation security risk
phasor measurement
« first
‹ previous
1
2
3
4