Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
JonDonym
traffic flow Identification
traffic flow behavior
Traffic flow
Tor
tools
telecommunication traffic
Resiliency
resilience
pubcrawl
Protocols
Metrics
machine learning
learning (artificial intelligence)
anonymity
internet
I2P
Human Factors
Human behavior
flow analysis approach
encryption
encrypted anonymity network traffic
dataset
data privacy
Cryptography
composability
Bandwidth
anonymity network users
biblio
On Detecting Manifestation of Adversary Characteristics
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
Adversary characteristics
Adversary Models
Communication system security
computer security
Data models
Human behavior
machine learning
Metrics
Predictive models
pubcrawl
Resiliency
risk-averse
Scalability
tools
Training
Wireless communication
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Constraining Attacker Capabilities Through Actuator Saturation
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
LTI control systems
vehicles platoon
tools
System performance
security
road vehicles
Resiliency
reachable sets
reachability analysis
pubcrawl
physical limits
outer ellipsoidal bounds
optimization
Metrics
mathematical tools
actuator saturation
Linear systems
linear matrix inequalities
Human behavior
Engines
Ellipsoids
dangerous states
control system synthesis
computer simulations
composability
attacker capabilities
artificial limits
actuators
actuator security
biblio
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Human behavior
XSS attack
Web sites
Web pages
Web Browser Security
tools
tags
security of data
Resiliency
pubcrawl
online front-ends
Metrics
input validation
hypermedia markup languages
Attack vectors
HTML5 based Web sites
Google Chromium browser extension
extensions
Electronic mail
cross-site scripting attack
cross-site scripting
cross document messaging
computer science
Compositionality
Browsers
Browser Security
Attributes
attribute abuse
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
Explainable AI for Designers: A Human-Centered Perspective on Mixed-Initiative Co-Creation
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
learning (artificial intelligence)
XAID framework
xai
visualization
tools
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
Neurons
mixed-initiative co-creation
machine learning
AI machine
Human-computer interaction
human-centered perspective
human-centered approach
human computer interaction
Games
game designers
game design
explainable artificial intelligence
explainable AI for designers
computer games
AI/ML techniques
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »