Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
An Approach To A Graph-Based Active Cyber Defense Model
Submitted by grigby1 on Fri, 08/18/2017 - 1:22pm
attack graphs
composability
Metrics
pubcrawl
Resiliency
biblio
General Graph Data De-Anonymization: From Mobility Traces to Social Networks
Submitted by grigby1 on Fri, 08/18/2017 - 1:21pm
attack graphs
composability
Graph de-anonymization
Metrics
mobility traces
pubcrawl
Resiliency
social networks
biblio
HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph
Submitted by grigby1 on Fri, 08/18/2017 - 1:21pm
attack graphs
composability
Metrics
pubcrawl
Resiliency
biblio
Scalable Attack Graph Generation
Submitted by grigby1 on Fri, 08/18/2017 - 1:21pm
attack graphs
Attack Modeling
composability
Metrics
pubcrawl
Resiliency
Vulnerability Analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »