Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

vulnerability exploitation

biblio

Visible to the public Analysis of Attack and Attackers on VoIP Honeypot Environment

Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
  • pubcrawl
  • vulnerability exploitation
  • VoIP-based Honeypot
  • VoIP Honeypot environment
  • VoIP
  • telecommunication security
  • SIP
  • Security Tests
  • security
  • Scalability
  • Resiliency
  • resilience
  • Reactive power
  • attacker profiles
  • Protocols
  • privacy
  • low interaction honeypot environment
  • IP networks
  • Internet telephony
  • Human Factors
  • Human behavior
  • honeypots
  • honey pots
  • Dogs
  • Conferences
biblio

Visible to the public A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS

Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
  • bayesian attack graphs
  • vulnerability exploitation
  • vulerability exploitation
  • NIST CVSS
  • NIST common vulnerability scoring system
  • network security assessment
  • Gold
  • CVSS metric version v2.0
  • CVSS metric version 3.0
  • CVSS metric version 1.0
  • CVSS
  • conditional probability computation method
  • Security Metrics
  • BAG
  • Computing Theory
  • Complexity theory
  • Metrics
  • conditional probability
  • Bayes methods
  • authentication
  • security of data
  • Measurement
  • pubcrawl
  • graph theory

Terms of Use  |  ©2023. CPS-VO