Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 2:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
« first
‹ previous
…
9
10
11
12
13
14
15
16
17