Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Resiliency
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
security of data
Cyber-security
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Protocols
delays
malware
advanced persistent threat
APT
synchronisation
cyber-attacks
Synchronization
Degradation
Clocks
advanced persistent threats
computer clocks
IEEE 1588
precision time protocol
programmable injector device
programmable Man-in-the-Middle
PTP
PTP infrastructure components
PTP time synchronisation networks
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
security of data
Intrusion Detection Systems
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Scalability
network security
advanced persistent threat
APT
IDS
graph model
data visualisation
coordinated attacks
security analysts
advanced persistent threats
alert graphs
community detection
event feature embeddings
feature embeddings
Graph Models
IP address
IP2Vec
persistent attacks detection
unsupervised clustering
word embedding
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Cryptography
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
cyberattacks
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
Long short-term memory
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
DeCrypto Pro
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Internet of Things
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Scalability
Decision Making
SDN
software defined networking
software-defined networking
computer networks
advanced persistent threat
APT
Reinforcement learning
active threat mitigation
ad-hoc solutions
ATMoS
autonomous network systems
autonomous threat mitigation
global network view
network behaviour
network security management
neural fitted Q-learning agent
RL-based threat mitigation
sequential decision making problems
threat vectors
biblio
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
tools
learning (artificial intelligence)
security of data
feature extraction
machine learning
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Conferences
Scalability
Trojan horses
Measurement
advanced persistent threat
APT
Zero-day attacks
graph theory
detection accuracy
APT attacks
advanced persistent threat detection
attack campaigns
benign tools
deep learning method
high profile information
online adaptive metric learning
provenance graph
TPR
true positive rate
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 12:39pm
security of data
feature extraction
Anomaly Detection
data analysis
Unsupervised Learning
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Correlation
Scalability
Cybersecurity
Training data
advanced persistent threat
APT
Clustering algorithms
pattern clustering
advanced persistent threats
Behaviour Analysis
Cyber Threats Intelligence
heterogeneous log-files
Log-files Analysis
malicious behaviour
Multi-stage threats
multistage threats
pattern extraction
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Analytical models
Scalability
Computational modeling
Security analysis
Games
Cyber Attacks
advanced persistent threat
APT
threat detection
cyberattack
game theory
Markov processes
q-learning
advanced persistent threats
Dynamic Information Flow Tracking
DIFT-based defender
Limiting average reward criteria
multistage attacks
Rain
real-word attack dataset
refinable attack investigation framework
Stackelberg semiMarkov game
Stackelberg zero-sum semi-Markov games
two-time scale Q-learning algorithm
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
advanced persistent threat
APT
gradient methods
APT attack
advanced persistent threat attacks
Mathematical model
objective function
information security system
Investment
APT attacks
attack minimization
effectiveness evaluation
formulated efficiency criterion
generalized efficiency criterion
generalized reduced gradient method
information security controls optimization
information security system effectiveness evaluation
information security systems effectiveness
mathematical programming
security investment maximization
biblio
Application of Advanced Persistent Threat Actors` Techniques aor Evaluating Defensive Countermeasures
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
information security
information security threats
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Protocols
knowledge based systems
advanced persistent threat
APT
Media
Application software
information security system
advanced persistent threat actors
adversaries’ tactics and techniques
ATT&CK knowledge base
car
evaluating defensive countermeasures
FSTEK TDB
MITRE ATT&ck
systematic knowledge
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 12:37pm
learning (artificial intelligence)
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
advanced persistent threat
APT
network attacks
game theory
Markov processes
Nash Equilibrium
attack graphs
game model
serious privacy leakage
advanced persistent threats
continuous method
game-theoretic framework
Multistage Maze Network Game
multistage plan
optimal network security
policy hill-climbing
policy hill-climbing algorithm
reinforcement learning (RL)
Stackelberg games
stealthy method
1
2
3
4
5
6
7
8
9
…
next ›
last »