Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

constant prioritization

biblio

Visible to the public Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements

Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
  • risk analysis
  • graph theory
  • managed assets
  • Organizations
  • potential hacking paths
  • prioritizes surgical requirements
  • prioritizing Agile Security requirements
  • process control
  • pubcrawl
  • Remediation Requirements
  • requirements backlog
  • Requirements Prioritization
  • graph analytics
  • risk management
  • risk-reduction security requirements
  • Scalability
  • security
  • Security Operation Center
  • security requirements
  • security scalability
  • software prototyping
  • Standards organizations
  • virtual adversary attack paths
  • business risks
  • Agile Security models different types
  • agile style
  • attack graph
  • Attack Path
  • attack surface
  • attack surface reduction
  • Big Data
  • Big Data Analytics
  • business data processing
  • business process targets
  • business processes
  • Agile Security
  • cardinal assets
  • complex big data graph
  • Compositionality
  • Computer crime
  • constant prioritization
  • critical assets identification
  • cyber attack graphs
  • Cyber Digital Twin
  • cyber-attacks
  • data analysis

Terms of Use  |  ©2023. CPS-VO