Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
attack graphs
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
computer network security
Resiliency
pubcrawl
composability
graph theory
reachability analysis
Decision Making
risk analysis
security issues
Predictive Metrics
attack graphs
automatic test software
automated vulnerability and risk analysis
automated vulnerability testing
AVRA
cyber attack graphs
cyber risk assessment process
cyber risk assessment uncertainty
cyber risk assessments
cyber risk reduction
end-to-end process
executable attack graphs
individual attack paths
suboptimal decision making
virtual environment
vulnerability assessments
vulnerability scans
biblio
A Hybrid Secure Keyword Search Scheme in Encrypted Graph for Social Media Database
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
nearest neighbor search
pubcrawl
Measurement
Predictive Metrics
active attacks
advanced encryption standard algorithm
attack graphs
Cloud Computing
cloud environment
composability
computer network security
confidentiality
Cryptography
data privacy
distributed environment
encrypted graph
encryption
graph
graph encryption
graph generation
graph theory
hybrid secure keyword search scheme
kNK keyword search algorithm
nearest neighbour methods
privacy preservation
query processing
Resiliency
search operation
search process
shortest path algorithm
social media database
social networking (online)
top k nearest keyword search algorithm
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
cyberattack
computer network security
cyber-physical systems
Resiliency
pubcrawl
composability
graph theory
security problem
Topology
telecommunication network topology
Predictive Metrics
Laplace equations
Communication channels
telecommunication control
distributed control
denial-of-service attack
denial-of-service attacks
attack graphs
CPSS
construction algorithm
Decentralized Control
denial-of-service (DoS) attacks
distributed control schemes
distributed controller independent
distributed event-triggered controller
distributed secure control
DoS attack modes
k-connected communication topology
k-connected graph
mode-switching DoS attacks
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
security
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
Predictive Metrics
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
atomic-level vulnerabilities
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
biblio
Research on Automatic Generation and Analysis Technology of Network Attack Graph
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
attack graphs
attack target asset value
automatic generation
composability
dependence attack graph
edge authority attack graph
graph theory
network attack graph
network security metrics
Network Security Reinforcement
network security reinforcement algorithm
network vulnerability index
optimisation
optimization
Predictive Metrics
probability
Probability-based Network Vulnerability Measurement
pubcrawl
Resiliency
security of data
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
attack graph
attack graph algorithm
attack graph generation
attack graphs
complete attack graph analysis
composability
computer network security
Correlation
data visualisation
Downlink
Firewalls (computing)
graph theory
industrial control
Industrial control network
integrated circuits
large-scale visualization
network model
network topology
Predictive Metrics
pubcrawl
Resiliency
three-dimensional interactive attack graph visualization tool
Uplink
visualization technology
vulnerability classification and correlation
vulnerability correlation method
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
computer network security
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
composability
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
complex network
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
hierarchical attack graph
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
security of data
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
Robustness
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
gradient methods
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient information
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
security of data
distributed processing
security
Trusted Computing
Resiliency
pubcrawl
composability
Sybil attack
graph theory
sybil attacks
Image edge detection
network topology
edge computing
Predictive Metrics
social networking (online)
Sensitivity
trust model
heterogeneous devices
attack graphs
aerospace industry
detection performance
graph preprocessing
graph processing
graph transformations
graph-based sybil detection
prominent security problems
refined graph structure
social structures
target distributed systems
trust mechanism
1
2
3
4
5
6
7
8
next ›
last »