Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability Management
biblio
An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services
Submitted by aekwall on Fri, 01/13/2023 - 3:04pm
security
Scalability
operating systems
pubcrawl
Open Source Software
Compositionality
Prototypes
Cloud Security
automation
Composite Services
elasticity
Resource Migration
security automation
Vulnerability Management
security scalability
biblio
Cyber Supply Chain Risk Management
Submitted by willirn1 on Tue, 10/26/2021 - 9:59am
systems security engineering
Executive Order 13636
Cyberspace Policy Review
Cybersecurity Strategy and Implementation Plan
Cybersecurity Enhancement Act
Comprehensive National Cybersecurity Initiative
software & firmware
Hardware
cloud & virtualization
Vulnerability Management
C-SCRM
security programs & operations
security measurement
security controls
risk assessment
malware
information sharing
cyber supply chain risk management
controls assessment
file
Vulnerability Evaluation and Prioritization for Cyber Resilient Systems
Submitted by akarns on Fri, 03/12/2021 - 2:54pm. Contributors:
Omer Keskin
Nick Gannon
Brian Lopez
Unal Tatar
ABSTRACT
CVSS
Cyber risk quantification
Resilient Systems
Vulnerability Management
vulnerability scoring
Presentations
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 10:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
Integrating Threat Intelligence to Enhance an Organization's Information Security Management
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
collaboration
composability
focus group discussion
Human behavior
Human Factors
information security
information theoretic security
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
threat intelligence
Vulnerability Management
biblio
Toward Smarter Vulnerability Discovery Using Machine Learning
Submitted by grigby1 on Fri, 02/08/2019 - 3:14pm
artificial intelligence security
composability
Human behavior
machine learning
Metrics
pubcrawl
Resiliency
Security Heuristics
Vulnerability Management
biblio
Challenges and Preparedness of SDN-based Firewalls
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
network manageability
Vulnerability Management
virtualization privacy
surveys and overviews
software defined networking
security and privacy
sdn based firewall
Resiliency
pubcrawl
privacy
OpenFlow protocol
OpenFlow
network security
Access Control
Metrics
Human behavior
header space analysis
flow control
firewalls
data plane
data centers
data center networks
control plane
Conflict Resolution
conflict detection
composability
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
Vulnerability Assessment in Autonomic Networks and Services: A Survey
Submitted by BrandonB on Wed, 05/06/2015 - 8:51am
Computers
vulnerability management process
Vulnerability Management
vulnerability assessment
security risks
security attacks
security
Monitoring
fault tolerant computing
Autonomic computing
computer security
computer network security
Complexity theory
Business
Autonomic systems
autonomic services
autonomic networks
autonomic management plane
1
2
next ›
last »