Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of SecUre and REsilient Cyber-Physical Systems (SURE)
Home
Research Team
Projects
Meetings
Members
Files
CPS-VO
»
Science of Security VO
»
Science of SecUre and REsilient Cyber-Physical Systems (SURE)
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Abbas, W.
Abbas, Waseem
Afroz, Sadia
Alex Kantchelian
Amin, Saurabh
An, Bo
Anthony D. Joseph
Ariel D. Procaccia
Armstrong, Robert C.
Aron Laszka
Bachwani, Rekha
Balandat, Maximilian
Barreto, Carlos
Bayen, Alexandre
Brad Miller
C. Cortes
Cardenas, Alvaro
CheeYee Tang
Dahan, Mathieu
David Blei
Dong, Roy
Dusko Pavlovic
Francis Bach
Gan, Jiarui
George Yiu
Goncalo Martins
Graham Hemingway
Heatherly, Raymond
J. D. Tygar
Jian Lou
Joseph, Anthony D.
K.Q. Weinberger
Kantarcioglu, Murat
Kantchelian, Alex
Karsai, Gabor
Ke, Liyiming
Keith Stouffer
Kereskenyi, Robert
Koutsoukos, X.
Koutsoukos, Xenofon
Krichene, Walid
Laszka, Aron
Lawrence S. Moss
Ledeczi, Akos
Letchford, Joshua
Li, Bo
Li, Muqun
Lina Sela Perelman
Ling Huang
Lou, Jian
M. Welling
Malin, Bradley
Maroti, Miklos
Mayo, Jackson R.
Michael Carl Tschantz
Miller, Brad
N.D. Lawrence
Neema, Himanshu
Nika Haghtalab
Nine, Harmon
Ohlsson, Henrik
Pavlovic, Dusko
Pawel Sobocinski
Perelman, Lina Sela
Ratliff, Lillian J
Rekha Bachwani
Richard Candell
Riyaz Faizullabhoy
Roy Dong
Ruthruff, Joseph R.
Sadia Afroz
Sajal Bhatia
Sastry, S Shankar
Saurabh Amin
Shankar, Vaishaal
Smith, Andrew
Sztipanovits, Janos
Tamas Kecskes
Tomlin, Claire
Tony Wu
Toshiki Kataoka
Tschantz, Michael Carl
Tygar, J. D.
Vaishaal Shankar
Volgyesi, Peter
Vorobeychik, Yevgeniy
Wan, Zhiyu
Waseem Abbas
Xenofon D. Koutsoukos
Xenofon Kousoukos
Xenofon Koutsoukos
Xia, Weiyi
Yevgeniy Vorobeychik
Z. Ghahramani
Journal Article
Conference Paper
Book Chapter
Miscellaneous
Keywords - Ad hoc networks
Keywords - aggregating labels
Keywords - algebra
Keywords - anti-virus vendors
Keywords - category
Keywords - command and control
Keywords - Complete coverage
Keywords - completion
Keywords - concept analysis
Keywords - covering density
Keywords - Cryptography and Security
Keywords - Cyber risk analysis and incentive design
Keywords - cyber-physical systems
Keywords - cyberinfrastructure
Keywords - data interoperability
Keywords - Discrete Mathematics
Keywords - distributed simulation
Keywords - dominating sets
Keywords - economics of security
Keywords - expectation-maximization
Keywords - Fault identification
Keywords - fault localization
Keywords - foundations
Keywords - game theory
Keywords - game theory; spear-phishing; machine learning; e-mail filtering; targeted attacks
Keywords - Game theory; Stackelberg game; Protection externality; Stackelberg game
Keywords - heterogeneous simulation
Keywords - Hierarchical Coordination and Control
Keywords - high-level architecture
Keywords - Hypothesis testing
Keywords - intruder detection systems
Keywords - intrusion
Keywords - labeling problem
Keywords - malware detection
Keywords - Manganese
Keywords - Measurement
Keywords - message authentication
Keywords - meta-modeling
Keywords - minimum test cover
Keywords - model-based integration
Keywords - model-based program synthesis
Keywords - model-based software; online collaboration; automatic code generation; web-based design environment
Keywords - Monitoring
Keywords - multi-model simulation
Keywords - multi-paradigm modeling
Keywords - network security
Keywords - Planning
Keywords - privacy
Keywords - re-identification
Keywords - Resilient Monitoring and Control
Keywords - Resilient Systems
Keywords - scheduling
Keywords - Science of decentralized security
Keywords - Science of Security
Keywords - semantic indexing
Keywords - sensing cost
Keywords - sensor networks
Keywords - sensors
Keywords - Statistical inference
Keywords - SURE Project
Keywords - systematic analysis
Keywords - Systems and Control
Keywords - Temporally consistent labels
Keywords - Threat Modeling
Keywords - trust
Keywords - water networks
Keywords - WebGME
Keywords - Wireless communication
Keywords - wireless sensor networks
SoS Documents: By Topic - Intrusion/Anomaly Detection and Malware Mitigation
SoS Documents: By Topic - Malware and Its Mitigation
SoS Documents: By Topic - Monitoring
SoS Documents: By Topic - Network Security
SoS Documents: By Topic - Phishing
SoS Documents: By Topic - Social Engineering Attacks
SoS Documents: By Topic - Vanderbilt
SURE: Topics - Cyber risk analysis and incentive design
SURE: Topics - Evaluation and experimentation
SURE: Topics - Hierarchical Coordination and Control
SURE: Topics - Resilient monitoring and control
SURE: Topics - Science of decentralized security
Topics - Architectures
Topics - Foundations
Topics - Modeling
Topics - Multi-models
Topics - Resilient Systems
Topics - Science of Security
Topics - Simulation
Topics - Testing
Topics - Validation and Verification
2016
2015
2014
2011
2009
Ad hoc networks
aggregating labels
algebra
anti-virus vendors
Architectures
category
command and control
Complete coverage
completion
concept analysis
covering density
Cryptography and Security
Cyber risk analysis and incentive design
Cyber-physical systems
cyberinfrastructure
data interoperability
Discrete Mathematics
distributed simulation
dominating sets
economics of security
Evaluation and experimentation
expectation-maximization
Fault identification
fault localization
Foundations
game theory
game theory; spear-phishing; machine learning; e-mail filtering; targeted attacks
Game theory; Stackelberg game; Protection externality; Stackelberg game
heterogeneous simulation
Hierarchical Coordination and Control
high-level architecture
hypothesis testing
intruder detection systems
intrusion
Intrusion/Anomaly Detection and Malware Mitigation
labeling problem
Malware and Its Mitigation
malware detection
Manganese
Measurement
message authentication
meta-modeling
minimum test cover
model-based integration
model-based program synthesis
model-based software; online collaboration; automatic code generation; web-based design environment
Modeling
Monitoring
multi-model simulation
Multi-models
multi-paradigm modeling
Network security
phishing
Planning
privacy
re-identification
Resilient Monitoring and Control
Resilient Systems
scheduling
Science of decentralized security
science of security
semantic indexing
sensing cost
Sensor networks
Sensors
simulation
Social Engineering Attacks
statistical inference
SURE Project
systematic analysis
Systems and Control
Temporally consistent labels
Testing
threat modeling
Trust
Validation and Verification
Vanderbilt
water networks
WebGME
Wireless communication
Wireless sensor networks