Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multistep attacks
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory