Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
CVSS-Based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Silicon
SIEM systems
SIEM
Security Metrics
security information and event management system
security events
risk management
risk assessment
Resiliency
resilience
Reliability
pubcrawl
Prototypes
network characteristics
attack graphs
Measurement
integrated security metrics
cyber situational awareness
CVSS-based probabilistic risk assessment
CVSS
countermeasure selection
computer network security
computer network risk assessment
composability
Common Vulnerability Scoring System
authentication
attacker characteristics
Attack Modeling
biblio
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
resilience
zero-day vulnerabilities
Virtual private networks
UV-RAM
Universal Serial Bus
unified vulnerability risk analysis module
system components
Servers
security of data
Security analysis
security
risk analysis
Resiliency
Analytical models
pubcrawl
new attack path mitigation
new attack path discovery
network hardening
modern networked systems
mitigation strategies
Metrics
graphical security models
Databases
composability
attack graphs
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »