Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adversary Models
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 1:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
Metrics
training dataset
security of data
security
Scalability
Resiliency
resilience
query processing
pubcrawl
Predictive models
Perturbation methods
out-of-distribution inputs
OOD queries
neural nets
model stealing attacks
Adaptation models
learning (artificial intelligence)
labeled dataset
Human behavior
deep neural networks
Data models
Computational modeling
Cloning
clone model
black-box query access
attacker clone model
attacker
Adversary Models
Adaptive Misinformation
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
machine learning
Scalability
Root-of-trust
Resiliency
resilience
pubcrawl
Picture archiving and communication systems
physically unclonable functions
Metrics
machine learning-based attacks
machine learning-based adversary model
Adversary Models
logic locking
learning (artificial intelligence)
Human behavior
Hardware
Cryptography
cryptographic scheme
cryptanalysis attacks
Composed Hardware
Boolean functions
Approximation algorithms
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Adversary Emulation
Adversary Models
cyber-physical security
cyber-physical systems
emulation
Human behavior
hybrid attack graph
Metrics
Numerical models
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
security
uncertainty
biblio
Authentication with Mildly Myopic Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
no-adversary capacity
zero authentication capacity
unsecured communications settings
underlying channel
transmitted sequences
telecommunication security
telecommunication channels
sufficient condition
stochastic encoder
Scalability
Resiliency
resilience
received information
pubcrawl
positive authentication capacity
noisy versions
Adversary Models
mildly myopic adversaries
Metrics
message authentication
malicious adversary
keyless authentication
Human behavior
essentially omniscient adversary
deterministic encoder
Cryptographic Protocols
channel states
channel condition
channel coding
channel capacity
binary channel model
biblio
Enhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
neural nets
transferable adversaries
Training
Task Analysis
single-step adversaries
security of data
Scalability
Resiliency
resilience enhancement
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Adversarial training
Multi-step Adversaries
Metrics
machine learning
learning (artificial intelligence)
Information systems
Human behavior
defense methods
deep learning networks
deep learning
classification decision model
Artificial Neural Networks
Adversary Models
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
« first
‹ previous
1
2
3
4
5
6
next ›
last »