Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
moving target defense
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
biblio
If You Can'T Measure It, You Can'T Improve It: Moving Target Defense Metrics
Submitted by grigby1 on Mon, 11/19/2018 - 12:28pm
Human behavior
Human Factors
Metrics
moving target defense
network neighborhood partitioning
objective space
pubcrawl
biblio
If You Can'T Measure It, You Can'T Improve It: Moving Target Defense Metrics
Submitted by grigby1 on Mon, 11/19/2018 - 12:28pm
Human behavior
Human Factors
Metrics
moving target defense
network neighborhood partitioning
objective space
pubcrawl
biblio
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control
Submitted by grigby1 on Wed, 09/12/2018 - 11:26am
Access Control
resilience
pubcrawl
Human behavior
Scalability
moving target defense
Resiliency
authorization
Human Factors
Attributes
mutated policies
Deterrence
biblio
Hidden Moving Target Defense in Smart Grids
Submitted by grigby1 on Wed, 09/12/2018 - 11:10am
false data injection attack
pubcrawl
moving target defense
resilience
Resiliency
state estimation
Smart Grid
CPS resilience
biblio
Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
adaptive cyber defense
bayesian attack graphs
composability
defense
Metrics
moving target defense
network security
online learning
POMDP
pubcrawl
Resiliency
Zero day attacks
biblio
Mitigating Selective Jamming Attacks in Smart Meter Data Collection Using Moving Target Defense
Submitted by grigby1 on Mon, 03/26/2018 - 1:00pm
composability
Metrics
moving target defense
network security
pubcrawl
random shuffling
resilience
Resiliency
selective jamming attacks
smart meters
wireless mesh networks
biblio
Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
Ports (Computers)
Training
static based attack detection techniques
smart power grids
smart meters
Smart Grids
smart grid IPv6 based advanced metering infrastructure
smart grid communications
smart grid advanced metering infrastructure
Smart Grid
security of data
Routing
Resiliency
pubcrawl
power system measurement
collaboration
Planar Key
object detection
network traffic
moving target defense intrusion detection system
moving target defense
Metrics
MATLAB
ipv6 security
IP networks
Intrusion Detection Systems
Intrusion Detection
Difference Plane
composability
biblio
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
obscuration technique
Logic gates
Metrics
moving target defense
moving target IPv6 defense
MT6D processor
network address
network infrastructure
network level
network packet processor
network processor
network time protocol listener
keyed access
operating system kernel
operating system kernels
personal area networks
Protocols
pubcrawl
Register Transfer Level network security processor implementation
Resiliency
Routing protocols
RTL development
system architectural design
system level functions
federal networks
application specific integrated circuits
ASIC
CISC architecture
Clocks
collaboration
complex instruction set computer architecture
composability
computer network security
cryptographic dynamic addressing
Encapsulation
Engines
application specific integrated circuit variant
FPGA
Hardware
hardware engine
HE-MT6D
Homeland Security Cyber Security Division
IEEE 802.3 Ethernet
Instruction sets
internet
IP networks
IPv6
ipv6 security
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »