Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayesian methods
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging