Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT attack
biblio
An Approach on Attack Path Prediction Modeling Based on Game Theory
Submitted by aekwall on Mon, 12/20/2021 - 11:23am
security
Organizations
Predictive models
Scalability
Analytical models
information technology
Games
pubcrawl
Metrics
Resiliency
Human behavior
game theory
advanced persistent threat
APT attack
game model
network defense framework
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
advanced persistent threat
Stackelberg game
Markov Decision Process
attacker engagement
APT attack
Markov processes
timing
Silicon
Robustness
APT
security
Metrics
Games
sensors
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Scalability
vehicular ad hoc networks
Metrics
advanced persistent threat
APT
road vehicles
APT attack
APT detection
VANET protection
biblio
Design of APT Attack Defense System Based on Dynamic Deception
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
dynamic IP address generation method
advanced persistent threat attack
APT attack defense system
APT defense system framework
deception defense process
defense APT attacks
defense system
DHCPv6
dynamic deception
APT attack
dynamic policy allocation mechanism
dynamic timing selection method
hybrid encryption communication mechanism
SM4
Socket
sockets
Viterbi algorithm
Cryptography
Firewalls (computing)
APT
advanced persistent threat
Dynamic scheduling
Metrics
Scalability
Heuristic algorithms
computer network security
Resiliency
resilience
Human behavior
pubcrawl
IP networks
Servers
encryption
biblio
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
malware
Power system protection
ML techniques
intrusion detection and prevention systems
Intrusion Detection and Prevention System
IDPS systems
cyber threat detection
AI
APT attack
Advanced Persistent Threat (APT)
power utilities
Smart Grids
APT
advanced persistent threat
cyber threats
Metrics
tools
computer security
Big Data
NIST
smart power grids
Smart Grid
power engineering computing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Artificial Intelligence
machine learning
security of data
learning (artificial intelligence)
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
Modeling the Operational Phases of APT Campaigns
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
APT
Tactics Techniques and Procedures
operational reading
operational phases
Knowledge engineering
final objectives achievement
cyberspace operations
cyber threat intelligence
Cyber Kill Chain
attack chronology
APT campaigns
advanced persistent threat attacks
APT attack
Context modeling
pubcrawl
advanced persistent threat
Metrics
Decision Making
NIST
Computational modeling
Data models
Scalability
Analytical models
computer network security
Resiliency
resilience
Human behavior
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
1
2
next ›
last »