Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph analytics
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
cyber resilient designs
Resilient Security Architectures
Resiliency
structured system engineering methodology
resilience requirements
Model-based Systems Engineering
mitigate cyber risk
MBSE tools
MBSE
inter-element relationships
graph analytics
graph analytic methods
graph analytic assisted model
engineering cyber resilient systems
design lifecycle
decision analysis methods
security of data
complex models
centralized MBSE database
cyber resilience
resilience
systems engineering
Risk
computer security
risk management
Analytical models
Cybersecurity
tools
graph theory
pubcrawl
Big Data
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Anomaly Detection on Bipartite Graphs for Cyber Situational Awareness and Threat Detection
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Anomaly Detection
Bipartite graph
composability
cyber security
Force
graph analytics
IP networks
Layout
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Servers
situational awareness
biblio
Deriving cyber use cases from graph projections of cyber data represented as bipartite graphs
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
Anomaly Detection
Bipartite graph
cyber security
graph analytics
IP networks
Measurement
Peer-to-peer computing
pubcrawl
Scalability
scalable
Scalable Security
security
Servers
situational awareness