Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
Dependability and Resource Optimation Analysis for Smart Grid Communication Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
stochastic petri nets
resource allocation
resource resource optimization analysis
Smart Grid
smart grid communication network reliability
smart grid security
Smart Grids
smart power grids
SPN
stochastic Petri net
reliability importance
stochastic programming
telecommunication network reliability
telecommunication security
Topology
two-way interactive communication
underlie communication network
wireless mesh network
wireless mesh network technology
wireless mesh networks
network management
computer architecture
cyber-attack risk
dependability analysis
dependability modeling
intelligent resource management
Logic gates
Markov processes
mean time to failure
MTTF
Availability
next generation power distribution
Petri nets
power distribution reliability
power system security
RBD
Redundancy
redundancy mechanism
reliability block diagrams
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Occlusive vehicle tracking via processing blocks in Markov random field
Submitted by BrandonB on Mon, 05/04/2015 - 1:29pm
Vectors
occlusion phenomenon
occlusive block total energy function
occlusive vehicle tracking
processing blocks
Robustness
spatial correlation
tracking
traffic images
occlusion handling
vehicle contour
Vehicle detection
vehicle motion information
vehicle texture information
vehicle tracking
vehicle video detection
vehicles
video signal processing
Markov processes
background subtraction
clique functions
image motion analysis
Image resolution
image texture
information extraction
Intelligent Transportation Systems
ITS
attribution problem
Markov random field
Markov Random Field (MRF)
Markov random fields
motion coherence
MRF model
object detection
object tracking
occlusion
biblio
Preserving location privacy based on distributed cache pushing
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
markov chain
Trajectory
Servers
privacy
mobility management (mobile radio)
mobile users
mobile computing
Mobile communication
Markov processes
cache storage
location privacy preservation scheme
location privacy
location based service
Distributed databases
distributed cache pushing
data privacy
computer architecture
biblio
Scaling laws for secrecy capacity in cooperative wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:33am
path loss exponent
Wyner randomized encoder
wireless networks
Transmitters
Tin
telecommunication security
serial block Markov scheme
secure communication
secrecy capacity
scaling laws
Relays
relay networks (telecommunication)
active cooperative relaying
parallel relaying scheme
Markov processes
interference limited communications
interference (signal)
encoding
cooperative wireless networks
cooperative communication
beamforming
array signal processing
Aggregates
biblio
Towards Comprehensive Modeling of Reliability for Smart Grids: Requirements and Challenges
Submitted by BrandonB on Fri, 05/01/2015 - 6:38am
power transmission
Vulnerability Analysis
Transmission line measurements
smart power grids
Smart Grids
smart grid reliability
Smart Grid
reliability modeling
Reliability
power transmission lines
Computational modeling
power system reliability
power generation
power engineering computing
power distribution
Markov processes
Markov embedded system model
IEEE-14 bus system
distributed power generation
cyber-physical systems
biblio
Robust H #x221E; cyber-attacks estimation for control systems
Submitted by BrandonB on Thu, 04/30/2015 - 10:59am
Markovian stochastic process
Symmetric matrices
stochastic systems
Stochastic processes
stochastic data DoS attack
stochastic data deception attack
stochastic cyber-attacks
Robustness
robust H∞ cyber-attacks estimation
robust control
quadruple-tank process
QTP
actuators
Markov processes
LMI
linear matrix inequalities
H∞ filters
H∞ filter
H∞ control
estimation
Cyber Attacks
control systems
control system synthesis
Computer crime
« first
‹ previous
…
4
5
6
7
8
9
10
11
12