Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
Improving Privacy in Graphs Through Node Addition
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Privacy-Preserving Mechanism (PPM)
k- automorohism
k- isomorphism
Measurement
Metrics
naïve ID removal
node addition
Peer-to-peer computing
Predictive Metrics
privacy
privacy models and measurement
k- anonymity
privacy-preserving mechanisms
pubcrawl
Resiliency
Routing
Scalability
seed-based attack
strongest attacks
structural attack
structure-based attack
structure-based de-anonymization attacks
edge addition
anonymity privacy
anonymization and de-anonymization
attack graphs
Autonomous System (AS)level graph
composability
computer security
Control Theory and Privacy
cyber-physical systems
data privacy
degree attacks
Computing Theory and Privacy
fake edges
fake nodes
graph data
graph data necessitates
graph privacy
graph theory
Human behavior
Inter-domain routing
internet
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Poisoning Attacks to Graph-Based Recommender Systems
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
Adversarial Machine Learning
Adversarial recommender systems
attack graphs
composability
Metrics
poisoning attacks
pubcrawl
recommender systems
resilience
Resiliency
biblio
Adversarial Attacks on Neural Networks for Graph Data
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
resilience
pubcrawl
Metrics
Resiliency
composability
Adversarial Machine Learning
attack graphs
graph convolutional networks
graph mining
network mining
semi-supervised learning
biblio
Attack Intent Analysis Method Based on Attack Path Graph
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
attack graphs
Attack intention
Attack path graph
Chained Attacks
composability
Critical assets
Metrics
pubcrawl
resilience
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »