Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack paths
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 11:51am
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory