Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph
biblio
Security Decision Support in the Control Systems based on Graph Models
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
Complexity theory
technical systems
response against violations
graph
countermeasure model
Control Theory
control
decision support
countermeasures
forecasting
information security
control systems
Decision Making
Scalability
Resiliency
Human Factors
Human behavior
pubcrawl
security
biblio
Suitability of Graph Representation for BGP Anomaly Detection
Submitted by grigby1 on Thu, 06/09/2022 - 1:23pm
Data models
graph
BGP Anomaly
Human Factors
Resiliency
Internet-scale Computing Security
Routing protocols
Compositionality
Metrics
composability
Computational modeling
Logic gates
Scalability
resilience
collaboration
policy-based governance
Human behavior
pubcrawl
machine learning
feature extraction
Training
biblio
Storage and Querying of Large Provenance Graphs Using NoSQL DSE
Submitted by aekwall on Tue, 10/12/2021 - 2:20pm
pubcrawl
Metrics
Resiliency
Human behavior
composability
Big Data
DSE
graph
NoSQL
Provenance
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
query processing
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
encryption
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
nearest neighbor search
encrypted graph
distributed environment
data privacy
Cryptography
confidentiality
computer network security
composability
cloud environment
Cloud Computing
attack graphs
advanced encryption standard algorithm
active attacks
Predictive Metrics
Measurement
pubcrawl
biblio
Dynamic Graphs on the GPU
Submitted by aekwall on Mon, 01/11/2021 - 12:31pm
graphics processing units
data deletion
graph
gpu
dynamic updates
dynamic graph data structures
dynamic
deletion speedups
adjacency lists
hash table
Scalability
Gold
arrays
Sparse matrices
maintenance engineering
privacy
data structures
graph theory
pubcrawl
Memory management
biblio
Using Graph Databases to Assess the Security of Thingernets Based on the Thingabilities and Thingertivity of Things
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
pubcrawl
security of data
security flaws
Security by Default
security
secure update mechanisms
Scalability
Risk
Resiliency
resilience
cyber
NoSQL databases
IoT security standards
IoT network complexity
IoT device vendors
IoT
Internet of Things
graph databases
graph
default IoT device configurations
biblio
Nonlinear Laplacian for Digraphs and Its Applications to Network Analysis
Submitted by grigby1 on Fri, 09/15/2017 - 10:03am
graph
graph theory
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
spectral
theory
biblio
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Submitted by grigby1 on Tue, 06/27/2017 - 12:47pm
cloud
graph
Metrics
privacy
pubcrawl
Resiliency
Scalability
subgraph match
user privacy
user privacy in the cloud
biblio
Spammer Detection for Real-time Big Data Graphs
Submitted by grigby1 on Tue, 06/27/2017 - 11:57am
big data privacy
circuit
composability
Compositionality
graph
Human behavior
local clustering coefficient
pubcrawl
Resiliency
Scalability
shortest path
spam detection
spammer
biblio
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
Submitted by grigby1 on Mon, 04/03/2017 - 10:31am
Dynamical Systems
signature based defense
Security Metrics
security
Resiliency
pubcrawl
Metrics
impact metric
graph
attack graphs
cyber security
Control Theory
Computing Theory
comparability
big data security metrics
big data security
Big Data