Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs
Submitted by aekwall on Mon, 01/10/2022 - 11:51am
intrusion detection system
uncertainty
Security Metrics
Security Metric and Time Latency
Resiliency
pubcrawl
Probabilistic logic
Predictive Metrics
Measurement
Security Risk Estimation
Intrusion Detection
estimation
Computational modeling
composability
attack graphs
attack graph
Adaptation models
biblio
An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph
Submitted by aekwall on Mon, 01/10/2022 - 11:51am
power systems
pubcrawl
Resiliency
composability
Knowledge engineering
computer security
Complexity theory
network security
Predictive Metrics
attack graph
knowledge graph
Ontologies
ontology desig
optimal penetration path
power WEB system
attack graphs
biblio
Security Analysis of Smart Home Systems Applying Attack Graph
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
pubcrawl
visualization
tools
Software
Smart homes
smart Home Systems
security scalability
security
Resiliency
security weaknesses
privacy
Predictive Metrics
Market research
Layout
composability
building management system
Building automation system
attack graphs
biblio
Structural Learning Techniques for Bayesian Attack Graphs in Cyber Physical Power Systems
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
data structures
Time factors
Time complexity
Structural Learning
Resiliency
real-time systems
pubcrawl
Predictive Metrics
power systems
Control Theory
composability
Boolean functions
Bayesian network
bayesian attack graph
Bayes methods
attack graphs
resilience
biblio
Structure-Aware Hierarchical Graph Pooling using Information Bottleneck
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
attack graphs
Benchmark testing
codes
composability
Data models
graph classification
graph neural networks
Graph Pooling
Information bottleneck
Perturbation methods
Predictive Metrics
pubcrawl
Resiliency
Robustness
Stability analysis
biblio
Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
Classification algorithms
Malware Analysis and Graph Theory
privacy
Predictive Metrics
Human behavior
Resiliency
adversarial attack
attack graphs
botnet
Training
composability
Computational modeling
graph analysis
IoT Botnet detection
malware
pubcrawl
Reinforcement learning
supervised learning
biblio
A Graph-based Approach to Detect DoB Attack
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
security
wireless sensor networks
quality of service
Anomaly Detection
surveillance
Conferences
pubcrawl
Resiliency
composability
WSN
Predictive Metrics
pervasive computing
DoB
dynamic graph
attack graphs
biblio
Research on Key Node Method of Network Attack Graph Based on Power Information Physical System
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
security
Conferences
power systems
pubcrawl
Resiliency
composability
telecommunication traffic
Predictive Metrics
network attack graph
node betweenness
node clustering degree
node degree
node proximity
spatial distribution characteristics of network traffic
attack graphs
biblio
The Cyber Attack on the Corporate Network Models Theoretical Aspects
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
attack implementation
attack graphs
weighted graph
network vulnerability
mathematical model parameters
Graphics
graph model of information attack
Filtering
cyber attack
corporate network
Cartesian product
Mathematical model
attack consequences assessment
Web servers
Predictive Metrics
cyberattack
Semantics
composability
Resiliency
pubcrawl
Protocols
biblio
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
Submitted by aekwall on Mon, 12/20/2021 - 11:22am
game theory
simulation
resource management
Resiliency
pubcrawl
Organizations
Metrics
Human behavior
genetic algorithm
Games
game theoretic security
Deception Technology
Data Breach
Conferences
Computational modeling
advanced persistent threat
Scalability
Predictive Metrics
Human Factors
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »