Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
MapReduce
uncertain knowledge representation
styling
Structure Learning
security
search problems
score-and-search-based algorithm
Resiliency
pubcrawl
parallel processing
network theory (graphs)
Mutual information
Massive Data
Markov processes
Algorithm design and analysis
learning (artificial intelligence)
Knowledge representation
Information Reuse
Hybrid Learning
hybrid Bayesian network structure learning
distributed hybrid structure learning algorithm
directed graphs
Data models
data mining model
Data mining
constraint-based algorithm
Bayes methods
Bayesian network
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
Balancing Data Security and Blocking Performance with Spectrum Randomization in Optical Networks
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
optical fibre networks
Time Frequency Analysis
telecommunication security
spectrum randomization
spectrum fragmentation
spectrum allocation proactive randomization
security
Scalability
RP arrival rate
resource management
Resiliency
randomization process arrival rate
random-fit spectrum allocation method
random reallocation fragment
Radio frequency
pubcrawl
Analytical models
Optical fiber networks
on-demand defragmentation scheme
occupancy pattern model
multiclass continuous-time Markov chain
Metrics
Markov processes
EOL
elastic optical networks
elastic optical link
data security improvement
data security balancing
data randomization
Data models
CTMC
connection security
biblio
Kolmogorov Extension, Martingale Convergence, and Compositionality of Processes
Submitted by K_Hooper on Fri, 10/13/2017 - 9:28am
composability
Compositionality
Computing Theory
Kolmogorov extension
Markov processes
martingale convergence
probabilistic computation
pubcrawl
biblio
Optimized Narrow-Band M2M Systems for Massive Cellular IoT Communications
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
Internet of Things
slotted-Aloha method
Resiliency
pubcrawl
Metrics
Markov processes
markov chain
machine-to-machine communications
machine-to-machine communication
M2M systems
LTE
Long Term Evolution
3GPP
Indexes
Human behavior
GSM
collaboration
clean-slate technologies
clean slate
cellular radio
cellular IOT communications
battery lifetime
Bandwidth
access protocols
biblio
1-recall reinforcement learning leading to an optimal equilibrium in potential games with discrete and continuous actions
Submitted by grigby1 on Wed, 03/08/2017 - 12:55pm
Markov processes
strategic decision makers
Stochastic processes
stochastic approximation
pubcrawl170110
potential games
payoff-based learning
optimization
optimal equilibrium
Nash Equilibrium
Nash equilibria
multiagent systems
multi-agent systems
1-recall reinforcement learning
Linear programming
learning automata
learning (artificial intelligence)
Games
game theory
distributed optimization
discrete actions
Decision Making
convergence
continuous actions
automata theory
agent dynamics
biblio
Optimal microgrid energy management integrating intermittent renewable energy and stochastic load
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
renewable energy sources
MG energy management problem
microgrid
mixed integer quadratic programming problem
optimization
optimization principle
programming
ptimal microgrid energy management
pubcrawl170110
Matlab optimization toolbox
Scenarios generation approach
stochastic
stochastic load
stochastic programming
time series
time-homogeneous Markov chain model
two-stage stochastic programming
continuous random variable
Markov processes
markov chain
LV network
Load modeling
intermittent renewable energy
integer programming
ESS
energy storage system
Energy storage
energy management systems
EMS
distributed power generation
distributed generator energy management
discrete stochastic scenario
DG energy management
biblio
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
computer architecture
Computer crime
intrusion tolerance
Markov processes
Numerical models
Preventive maintenance
pubcrawl170109
Servers
System Availability
biblio
Resilient cumulant game control for cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
linear Markovian system
Trajectory
security vulnerability
security of data
quadratic cost function optimization
pubcrawl170107
optimisation
Nash game
Nash Equilibrium
Mathematical model
Markov processes
control feedback gain variation
linear hybrid stochastic system
HJB equation
Hamilton-Jacobi-Bellman equation
Games
game theory
full-state feedback
cyber-physical systems
cyber-physical system
cumulant game control resiliency
Cost function
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 11:14am
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »