Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system vulnerabilities
biblio
Machine Learning Based Approach for the Automated Mapping of Discovered Vulnerabilities to Adversial Tactics
Submitted by grigby1 on Mon, 02/07/2022 - 3:44pm
privacy
machine learning
machine learning algorithms
Neural networks
pubcrawl
resilience
Resiliency
Conferences
composability
Measurement
Forensics
system vulnerabilities
automatic mapping
Digital Forensic Engineering
MITRE Adversarial Tactics
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
An Automated Composite Scanning Tool with Multiple Vulnerabilities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
system vulnerabilities
Cross Site Scripting
vulnerability detection module
the vulnerability detection module
multiple vulnerabilities
frequent vulnerabilities
directory traversal
composite detection tool
automated composite scanning tool
Cross-site Scripting Attacks
computer network security
detection method
network security protection
SQL
SQL injection
pubcrawl
Human behavior
Resiliency
network security
Scalability
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 10:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)