Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

cloud-computing services

biblio

Visible to the public A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing

Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
  • resilience
  • insider attacks
  • Kill Chain
  • kill-chain approach
  • kill-chain based method
  • malicious insider
  • malicious insiders
  • Measurement
  • multiple indirect detection measures
  • Packet Sniffing
  • pubcrawl
  • insider attack
  • Resiliency
  • Scalability
  • security of data
  • Servers
  • SIM-card manufacturer Gemalto
  • Tesla
  • trees (mathematics)
  • Undetectable Attacks
  • virtual machines
  • Virtual machining
  • cloud-computing environment
  • attack tree
  • attack trees
  • attack vector
  • Attack vectors
  • attack-detection strategies
  • Aviva Insurance
  • bank data processing
  • cloud cluster
  • Cloud Computing
  • cloud paradigms
  • Chained Attacks
  • cloud-computing services
  • cloud-service environments
  • cloud-service providers
  • combined attack-tree
  • Companies
  • Computer crime
  • Google
  • Human behavior
  • Indirect Detection
  • indirect detection opportunities

Terms of Use  |  ©2023. CPS-VO