Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
APT
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
Training data
pattern extraction
multistage threats
Multi-stage threats
malicious behaviour
Log-files Analysis
heterogeneous log-files
Cyber Threats Intelligence
Behaviour Analysis
advanced persistent threats
pattern clustering
Clustering algorithms
APT
advanced persistent threat
security of data
Cybersecurity
Scalability
Correlation
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
Unsupervised Learning
data analysis
Anomaly Detection
feature extraction
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Application of Advanced Persistent Threat Actors` Techniques aor Evaluating Defensive Countermeasures
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
APT
systematic knowledge
MITRE ATT&ck
FSTEK TDB
evaluating defensive countermeasures
car
ATT&CK knowledge base
adversaries’ tactics and techniques
advanced persistent threat actors
information security system
Application software
Media
security of data
advanced persistent threat
knowledge based systems
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
information security threats
information security
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
NotPetya
WannaCry
SoC
situation-driven framework
SIEM
security situation
Security Policies Analysis
security operation centers
security incident
security administrators
Radar
pubcrawl
policy-based governance
APT
networks security experts
machine learning based approaches
loC
learning (artificial intelligence)
Intrusion Detection
event management solutions
dynSMAUG
dynamic security management
cyberattacks
computer network security
CEP
biblio
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
advanced persistent threat
Stackelberg game
Markov Decision Process
attacker engagement
APT attack
Markov processes
timing
Silicon
Robustness
APT
security
Metrics
Games
sensors
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Scalability
vehicular ad hoc networks
Metrics
advanced persistent threat
APT
road vehicles
APT attack
APT detection
VANET protection
biblio
Design of APT Attack Defense System Based on Dynamic Deception
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
dynamic IP address generation method
advanced persistent threat attack
APT attack defense system
APT defense system framework
deception defense process
defense APT attacks
defense system
DHCPv6
dynamic deception
APT attack
dynamic policy allocation mechanism
dynamic timing selection method
hybrid encryption communication mechanism
SM4
Socket
sockets
Viterbi algorithm
Cryptography
Firewalls (computing)
APT
advanced persistent threat
Dynamic scheduling
Metrics
Scalability
Heuristic algorithms
computer network security
Resiliency
resilience
Human behavior
pubcrawl
IP networks
Servers
encryption
biblio
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Submitted by grigby1 on Fri, 08/07/2020 - 3:58pm
malware
Power system protection
ML techniques
intrusion detection and prevention systems
Intrusion Detection and Prevention System
IDPS systems
cyber threat detection
AI
APT attack
Advanced Persistent Threat (APT)
power utilities
Smart Grids
APT
advanced persistent threat
cyber threats
Metrics
tools
computer security
Big Data
NIST
smart power grids
Smart Grid
power engineering computing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Artificial Intelligence
machine learning
security of data
learning (artificial intelligence)
« first
‹ previous
1
2
3
4
5
6
next ›
last »