Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
Formal Proof of Security Algorithms Based on Reachability Reduction
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
attack graph
attack graphs
formal proof
Human behavior
Identity management
identity snowball attack
Metrics
protocol verification
pubcrawl
reachability reduction
Resiliency
Scalability
security
sparsest\_cut
biblio
Discovering Malicious Domains Through Passive DNS Data Graph Analysis
Submitted by grigby1 on Tue, 05/30/2017 - 1:01pm
attack graphs
composability
Human behavior
malicious domains
Metrics
passive dns
pubcrawl
relational database security
Resiliency
biblio
Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs
Submitted by grigby1 on Mon, 05/22/2017 - 2:06pm
Human behavior
typed graphs
Time Frequency Analysis
threat vectors
temporal networks
streamspot
security
Scalability
Resiliency
pubcrawl
Metrics
advanced persistent threat
heterogenous graphs
graph sketches
evolving graphs
edge detection
dynamic networks
composability
Attack vectors
attack graphs
Anomaly Detection
biblio
Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment
Submitted by grigby1 on Mon, 05/22/2017 - 2:06pm
attack graphs
composability
cyber-physical systems
Human behavior
Metrics
pubcrawl
Quantitative risk assessment
Resiliency
Threat Modeling
threat vectors
biblio
Dependency Graph Analysis and Moving Target Defense Selection
Submitted by grigby1 on Thu, 05/18/2017 - 2:44pm
attack graphs
attack surface
composability
Cybersecurity
dynamic defense
Dynamical Systems
graph theory
Malware Analysis
Metrics
moving target defenses
pubcrawl
Resiliency
biblio
Measuring and Improving the Effectiveness of Defense-in-Depth Postures
Submitted by grigby1 on Wed, 05/17/2017 - 1:57pm
attack graph
attack graphs
controller area network security
controller area networks
defense in depth
Industrial Control Systems
Internet of Things
Internet of Things (IoT)
Measurement
Metrics
Network Security Architecture
pubcrawl
Resiliency
Scalability
security
security weaknesses
file
An Approach to Incorporating Uncertainty in Network Security Analysis
Submitted by awhitesell on Mon, 04/03/2017 - 5:08pm
Science of Security
A Hypothesis Testing Framework for Network Security
attack graphs
network security
NSA SoS Lablets Materials
Science of Security
UIUC
uncertainty analysis
UIUC
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
An Approach to Incorporating Uncertainty in Network Security Analysis
Submitted by awhitesell on Mon, 04/03/2017 - 5:08pm
Science of Security
A Hypothesis Testing Framework for Network Security
attack graphs
network security
NSA SoS Lablets Materials
Science of Security
UIUC
uncertainty analysis
UIUC
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
Submitted by grigby1 on Mon, 04/03/2017 - 11:31am
Dynamical Systems
signature based defense
Security Metrics
security
Resiliency
pubcrawl
Metrics
impact metric
graph
attack graphs
cyber security
Control Theory
Computing Theory
comparability
big data security metrics
big data security
Big Data
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »