Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
lateral movement
biblio
MLTracer: Malicious Logins Detection System via Graph Neural Network
Submitted by grigby1 on Mon, 03/29/2021 - 12:15pm
Graph Neural Network
security
Scalability
real-time systems
pubcrawl
privacy
malicious logins detection
lateral movement
Human Factors
graph neural networks
Neural Network Security
expert systems
Data mining
convolutional neural networks
Conferences
co-attention mechanism
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
biblio
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement
Submitted by thurlwel on Tue, 10/24/2017 - 3:38pm
Science of Security
advanced persistent threat
advanced persistent threats
Anomaly Detection
command and control
lateral movement
pubcrawl
Science of Security
biblio
"Concept for a security investigation framework"
Submitted by abfox on Tue, 02/14/2017 - 11:29am
malware
Trace Attacks
telecommunication security
standards
SIF
security systems
security investigation framework
Reliability
pubcrawl170101
Multi-Stage Attack
multi-stage APT
malware analyses
advanced persistent threat
log files
lateral movement
Investigation Framework
Forensics
forensic investigations
Correlation
Companies
APT campaigns
APT
advanced persistent threat campaigns