Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
resilience
pubcrawl
Metrics
Resiliency
composability
attack graph
network security
attack graphs
Meta heuristic technique
particle swarm optimization
Security analysis
biblio
A Meta Language for Threat Modeling and Attack Simulations
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
attack graphs
composability
Cyber Dependencies
cyber security
domain specific language
Metrics
pubcrawl
resilience
Resiliency
Threat Modeling
biblio
An Attack Graph-Based On-Line Multi-Step Attack Detector
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
resilience
pubcrawl
Metrics
Resiliency
composability
Attack detection
attack graphs
Alert correlation
Attack Visualization
Multi-step Attacks
biblio
Automated Security Investment Analysis of Dynamic Networks
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
resilience
pubcrawl
Metrics
Resiliency
composability
Security analysis
security economics
attack graphs
attack trees
Security Metrics
biblio
Attack Difficulty Metric for Assessment of Network Security
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
resilience
pubcrawl
Metrics
Resiliency
composability
attack graph
network security
Security Metrics
attack graphs
biblio
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
IMCGS
security
search problems
Resiliency
resilience
pubcrawl
path loss
optimal attack path analysis
Optimal attack path
network security
Monte Carlo methods
Metrics
k-zero attack graph
improved Monte Carlo graph search algorithm
Improved Monte Carlo Graph Search
ACO
Heuristic algorithms
graph theory
Games
dynamic programming
CVSS value
computer network security
composability
Backpropagation
attack graphs
attack graph
Artificial Neural Networks
ant colony optimization algorithm
ant colony optimisation
biblio
Detection of Integrity Attacks to Smart Grids Using Process Mining and Time-Evolving Graphs
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
integrity attack
attack graphs
work-in-progress approach
time-evolving graphs
time evolving graphs
smart power grids
smart meters
Smart Grids
process mining
Meters
Ireland Commission for Energy Regulation
integrity attacks
resilience
Frequency measurement
power system security
power engineering computing
Data mining
Anomaly Detection
graph theory
composability
Resiliency
Metrics
pubcrawl
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »