Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network administrator
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
SDN switch
network security
normal forwarding method
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
SDN controller
network attacks
SDN-Ti prototype
Servers
Software Defined Network
software defined networking
stateless address autoconfiguration protocol
Switches
telecommunication traffic
trusted ID-encoded address
IPv6 address assignment scenarios
attacker traceback
authentication
collaboration
composability
computer network security
Cryptography
internet
IP networks
attack incident
IPv6 addresses
IPv6 networks
ipv6 security
IPv6 testbed
Metrics
network accountability
network administrator
biblio
Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Mathematical model
zero-sum repeated game
Zero-Sum Games
security of data
security
Scalability
Resiliency
resilience
rational strategy
rational attacker
pubcrawl
optimal cyber-defense strategies
network security
network administrator
Metrics
advanced persistent threats
Human behavior
graph edges
Games
game theory
game theoretical analysis
expressive model
Exponential distribution
defense budget
Data models
cyber attackers
Cyber attack modeling
cognition
budget constrained network administrators