Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network defense
biblio
A Selection Strategy for Network Security Defense Based on a Time Game Model
Submitted by grigby1 on Fri, 08/26/2022 - 11:09am
security
pubcrawl
Heuristic algorithms
Analytical models
real-time systems
network security
Games
Metrics
Nash Equilibrium
Computing Theory
numerical simulation
Infectious Disease Model
network defense
Optimal Defense Strategy
time game
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software