Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT attacks
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 2:37pm
security
learning (artificial intelligence)
machine learning
Measurement
online adaptive metric learning
provenance graph
pubcrawl
resilience
Scalability
high profile information
security of data
tools
TPR
Trojan horses
true positive rate
Zero day attacks
Zero-day attacks
attack campaigns
Human behavior
Metrics
Resiliency
composability
advanced persistent threat
advanced persistent threat detection
APT
APT attacks
Provenance
benign tools
Conferences
deep learning method
defense
detection accuracy
feature extraction
graph theory
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
multistage attacks
Zero Day Attacks and Defense
user vulnerabilities
User behavior
technical security
system weaknesses
Spear-phishing
socio-technical vulnerabilities
socio-technical countermeasures
socio vulnerabilities dimension
socio factors
organizational management
nontechnical vulnerabilities
near zero-day malware
invasive software
internetworked computer users
inadequate cyber defenses
environmental factors
APT threats
APT attacks
advanced persistent threats (apt)
advanced persistent threats
Predictive Metrics
organisational aspects
composability
pubcrawl
Resiliency
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
biblio
"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Submitted by abfox on Tue, 02/14/2017 - 12:44pm
malware
virtual networks
pubcrawl170101
Protocols
Ports (Computers)
penetration and exploration phase
path control
OpenFlow technology
OpenFlow
network security
mission execution phase
malware responding system
malware detection system
malware communication
advanced persistent threat attacks
IP networks
invasive software
intrusion detection system
initial compromise phase
entry control measures
Dynamic Responding
Digital Forensics
Databases
computer security
computer network security
attacking infrastructure building phase
APT attacks