Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network vulnerabilities
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 1:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
biblio
Security Enhancement for the Network Amalgamation using Machine Learning Algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:02pm
Human behavior
Task Analysis
Security Metrics
security enhancement
security
Scalability
resilience
pubcrawl
Protocols
network vulnerabilities
network amalgamation
Monitoring
Metrics
machine learning algorithms
learning (artificial intelligence)
machine learning
feature extraction
data transaction
Data Security
computer networks
computer network security
computer network
BIOS
biometrics (access control)
biometric authenticity
Bio-metric authenticity
privacy
composability
Resiliency
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs