Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graph
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
Developing Models for Physical Attacks in Cyber-Physical Systems
Submitted by grigby1 on Wed, 09/12/2018 - 11:02am
cyber-physical systems
pubcrawl
Human behavior
attack graph
privacy
Ontology
Human Factors
Physical attack
CPS Privacy
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
file
Developing Models for Physical Attacks in Cyber-Physical Systems
Submitted by awhitesell on Fri, 07/13/2018 - 2:37pm
Science of Security
attack graph
cyber-physical systems
Monitoring, Fusion, and Response for Cyber Resilience
NSA SoS Lablets Materials
Ontology
Physical attack
Resilient Architectures
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Developing Models for Physical Attacks in Cyber-Physical Systems Security and Privacy
Submitted by awhitesell on Fri, 07/13/2018 - 2:37pm
Science of Security
attack graph
cyber-physical systems
Monitoring, Fusion, and Response for Cyber Resilience
NSA SoS Lablets Materials
Ontology
Physical attack
Resilient Architectures
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Resilient Architectures
UIUC
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Formal Proof of Security Algorithms Based on Reachability Reduction
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
attack graph
attack graphs
formal proof
Human behavior
Identity management
identity snowball attack
Metrics
protocol verification
pubcrawl
reachability reduction
Resiliency
Scalability
security
sparsest\_cut
« first
‹ previous
1
2
3
4
5
next ›
last »