Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack cost
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl