Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
Compressive Sampling Stepped Frequency Ground Penetrating Radar Using Group Sparsity and Markov Chain Sparsity Model
Submitted by aekwall on Mon, 09/14/2020 - 11:30am
Ground penetrating radar
stepped frequency radar
sparse image
sparse delays
random frequencies
random antenna positions
radar resolution
radar imaging
radar data
radar antennas
Position measurement
Markov chain sparsity model
Markov Chain model
land mine detection
group sparsity
Group Sparse
Frequency measurement
compressive sampling stepped frequency ground penetrating radar
buried object detection
B-scan
Antenna measurements
A-scan
compressive sampling
markov chain
compressed sensing
Markov processes
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
linear matrix inequalities
Chained Attacks
stochastic systems
stochastic stabilization
stabilization problem
random replay attack
packet losses
Markovian jump linear system
Markov chains
linear matrix inequality formulation
jumping parameters
communication delays
Numerical stability
Cyber Physical System
computer network security
closed loop systems
closed-loop system
CPS
Trajectory
stability
Linear systems
Markov processes
Stability analysis
delays
pubcrawl
Resiliency
cyber-physical systems
Scalability
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
electricity grid
Chained Attacks
data injection attack scenario
attack models
PLADD
Cyber-physical security assessment
bad data injection
attack propagation
attack graph
markov chain
cyber-physical system
Power Grid
security of data
Markov processes
power system security
power engineering computing
password
power grids
pubcrawl
Resiliency
cyber-physical systems
Data models
Scalability
IP networks
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
execution stage
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
Power Grid
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
smart power grids
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
security of data
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
biblio
Markov Models of Cyber Kill Chains with Iterations
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Information systems
Weapons
targeted cyber-attack processes
targeted cyber attacks
stochastic models
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
Markov processes
Markov Models
Chained Attacks
homogeneous continuous time Markov chains
homogeneous continuous time Markov chain
cyber-attacks life cycles
cyber-attack process
cyber-attack life cycle
cyber-attack kill chains
cyber threats
cyber kill chains bases
cyber kill chain with iterations
command and control systems
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Markov processes
Chained Attacks
target NFC network
near-field communication
markov chain
intrusive detection system
electronic payment cases
attack anomalies
Near Field Communication
Training data
security of data
embedded system security
Relays
relay attack
Google
pubcrawl
Resiliency
Data models
security
Scalability
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
advanced persistent threat
Stackelberg game
Markov Decision Process
attacker engagement
APT attack
Markov processes
timing
Silicon
Robustness
APT
security
Metrics
Games
sensors
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
Markov based mathematical model
threat surface
Resiliency
resilience
pubcrawl
Private Key Storage
private key leakage
private key cryptography
permissioned blockchain
outline justification
Metrics
Media
Mathematical model
Markov processes
Markov model
Air Gapped Storage
malware
key extraction
Human Factors
Human behavior
Electromagnetics
Distributed databases
cryptocurrencies
composability
Channel Exfiltration
attack surface
Atmospheric modeling
air-gapped blockchain wallets
Air gaps
Air Gapped Wallet
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 2:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »