Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack Path
biblio
Extending a security ontology framework to model CAPEC attack paths and TAL adversary profiles
Submitted by aekwall on Thu, 02/02/2023 - 4:43pm
Dictionaries
Stochastic Computing Security
TAL
Ontology
modeling
capec
Attack Path
ADVISE
adversary profile
Ontologies
security
Petri nets
Stochastic processes
Europe
taxonomy
Resiliency
Scalability
pubcrawl
Computational modeling
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis