Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graph
biblio
Identification of Attack Paths Using Kill Chain and Attack Graphs
Submitted by grigby1 on Fri, 04/14/2023 - 3:04pm
cyberattack
CVE
asset management
Resiliency
Chained Attacks
Kill Chain
MITRE ATT&ck
STRIDE
threat identification
Organizations
Reconnaissance
attack graph
Force
Standards organizations
Scalability
Generators
resilience
pubcrawl
biblio
CVSS-based Vulnerability and Risk Assessment for High Performance Computing Networks
Submitted by aekwall on Thu, 02/02/2023 - 4:45pm
real-time systems
standardization
pubcrawl
Scalability
Resiliency
Knowledge engineering
Throughput
network security
Stochastic processes
CVSS
attack graph
Numerical models
HPC
Vulnerability
risk assessment
Stochastic Computing Security
biblio
Towards 5G-ready Security Metrics
Submitted by grigby1 on Tue, 09/20/2022 - 1:01pm
Organizations
pubcrawl
Metrics
Conferences
5G mobile communication
Computational modeling
Industries
Measurement
cloud
Telecommunications
5G
attack graph
Security Metrics
Computing Theory
network function virtualization
biblio
A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
cyber security risk assessment
security
Scalability
risk management
Resiliency
pubcrawl
Information systems
Human Factors
Human behavior
Security Risk Management
Control Theory
control systems
Computers
Computer crime
complex networks
complex network theory
Communication-Based Train Control
attack graph
biblio
Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs
Submitted by aekwall on Mon, 01/10/2022 - 11:51am
intrusion detection system
uncertainty
Security Metrics
Security Metric and Time Latency
Resiliency
pubcrawl
Probabilistic logic
Predictive Metrics
Measurement
Security Risk Estimation
Intrusion Detection
estimation
Computational modeling
composability
attack graphs
attack graph
Adaptation models
biblio
An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph
Submitted by aekwall on Mon, 01/10/2022 - 11:51am
power systems
pubcrawl
Resiliency
composability
Knowledge engineering
computer security
Complexity theory
network security
Predictive Metrics
attack graph
knowledge graph
Ontologies
ontology desig
optimal penetration path
power WEB system
attack graphs
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 7:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Decision Support for Mission-Centric Network Security Management
Submitted by aekwall on Tue, 04/27/2021 - 12:11pm
cyber-physical systems
Resiliency
pubcrawl
Bayesian network
belief networks
attack graph
cyber situational awareness
decision support
Mission resilience
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
1
2
3
4
5
next ›
last »