Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

vulnerability scans

biblio

Visible to the public Automated Vulnerability Testing via Executable Attack Graphs

Submitted by aekwall on Mon, 01/25/2021 - 1:04pm
  • automated vulnerability testing
  • vulnerability scans
  • vulnerability assessments
  • virtual environment
  • suboptimal decision making
  • individual attack paths
  • executable attack graphs
  • end-to-end process
  • cyber risk reduction
  • cyber risk assessments
  • cyber risk assessment uncertainty
  • cyber risk assessment process
  • cyber attack graphs
  • AVRA
  • computer network security
  • automated vulnerability and risk analysis
  • automatic test software
  • attack graphs
  • Predictive Metrics
  • security issues
  • risk analysis
  • Decision Making
  • reachability analysis
  • graph theory
  • composability
  • pubcrawl
  • Resiliency
biblio

Visible to the public Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics

Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
  • honeypots
  • Web systems
  • Web attacks
  • web applications
  • Web 2.0
  • vulnerability scans
  • Support vector machines
  • radio access networks
  • malicious cyber activities
  • internet
  • attacks
  • high-interaction honey pots
  • feature selection method
  • feature extraction
  • Encyclopedias
  • computer network security
  • classification of malicious cyber activities
  • Blogs
  • behavioral clustering analysis
  • behavioral characteristics

Terms of Use  |  ©2023. CPS-VO