Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

actual attack plan

biblio

Visible to the public An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks

Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
  • attack graphs
  • Chained Attacks
  • underlying attack
  • smaller incidents
  • skilled adversaries
  • security-context
  • security-aware partitions
  • Persistent attacks
  • optimization approach
  • multistep attacks
  • kill chain progression
  • graph partitioning
  • false-positives
  • enterprise networks
  • actual attack plan
  • advanced persistent threats
  • security of data
  • Linear programming
  • security perspective
  • graph theory
  • detection algorithms
  • standards
  • Topology
  • Scalability
  • Correlation
  • optimization
  • computer network security
  • Resiliency
  • resilience
  • pubcrawl
  • security

Terms of Use  |  ©2023. CPS-VO