Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack graphs
biblio
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
attack graph analysis
attack graphs
attack surface
authentication
graph theory
information security
Measurement
security frameworks
security of data
Servers
Software
Vectors
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 11:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
file
Computer Security for the Home User
Submitted by Katie Dey on Wed, 12/19/2012 - 2:31pm. Contributors:
Adele Howe
Indrajit Ray
Zinta Byrne
ABSTRACT
SaTC Posters
Artificial Intelligence
attack graphs
Colorado State University
psychology
security
0905232
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3
4
5
6
7
8
9