Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
attack graph
biblio
Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs
Submitted by aekwall on Mon, 01/10/2022 - 12:51pm
intrusion detection system
uncertainty
Security Metrics
Security Metric and Time Latency
Resiliency
pubcrawl
Probabilistic logic
Predictive Metrics
Measurement
Security Risk Estimation
Intrusion Detection
estimation
Computational modeling
composability
attack graphs
attack graph
Adaptation models
biblio
An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph
Submitted by aekwall on Mon, 01/10/2022 - 12:51pm
power systems
pubcrawl
Resiliency
composability
Knowledge engineering
computer security
Complexity theory
network security
Predictive Metrics
attack graph
knowledge graph
Ontologies
ontology desig
optimal penetration path
power WEB system
attack graphs
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 8:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Decision Support for Mission-Centric Network Security Management
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
cyber-physical systems
Resiliency
pubcrawl
Bayesian network
belief networks
attack graph
cyber situational awareness
decision support
Mission resilience
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
1
2
3
4
next ›
last »