Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy
Submitted by aekwall on Mon, 07/27/2020 - 11:13am
stochastic reward net
vulnerability checking
System Availability
stochastic model
reactive defense strategies
pull-type security patch management
phase-type approximation.
phase-type approximation
Markov regenerative process models
intrusion tolerant system
Intrusion tolerance system
composite stochastic reward net
intrusion tolerance
security of data
security patch management
pull-type patch management
periodic vulnerability checking strategy
interval availability
Markov processes
maintenance engineering
computer security
composability
pubcrawl
Resiliency
computer architecture
Servers
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Markov Augmented Neural Networks for Streaming Video Classification
Submitted by grigby1 on Fri, 07/03/2020 - 12:27pm
Markov processes
video streaming services
video streaming
video signal processing
telecommunication traffic
streaming video classification
Scalability
Resiliency
resilience
pubcrawl
port scanning
Neural networks
neural nets
content providers
Markov Decision Process
Markov augmented neural networks
machine learning
IP networks
IP addresses
internet providers
internet
Inspection
image classification
deep packet inspection techniques
deep packet inspection
decision theory
biblio
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
Migration
VM migration
Virtual machining
virtual machines
virtual machine security
virtual machine migration modeling
static security measures
sophisticated methods
Servers
security of data
security mechanism
security
pubcrawl
probability
network topology
model migration
Adaptation models
Markov processes
intrusion
dynamic security measure
dynamic security
dynamic attack surface
destination server parameters
Destination Server
continuous-time Markov Chain model
Computational modeling
complex networks
complex network
cloud environment
cloud computing environment
Cloud Computing
biblio
Heuristics-Based Multi-Agent Task Allocation for Resilient Operations
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
pre-requisite
Markovian assumptions
Markovian state information
modeling probabilistic failure
natural world
navigation
nonMarkovian setting
nonMarkovian state modeling
novel heuristic
intelligent task assignment
real-world systems
realistic state
rescue robots
resilient operations
SAR
uncertainty modeling
Security Heuristics
predictability
Probabilistic logic
Task Analysis
Resiliency
pubcrawl
resource management
multi-robot systems
multi-agent systems
robots
uncertainty
Scalability
Markov processes
Linear programming
agent failure
complex environments
heuristics-based multiagent task allocation
imulated search and rescue mission
inherent challenges
biblio
SCORE: A Security-Oriented Cyber-Physical Optimal Response Engine
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
security of data
power system reliability
power system resilience
power system security
power system stability
pubcrawl
pure cyber-physical states
Relays
resilience
Resiliency
power system operators
security-oriented cyber-physical optimal response engine
Smart Grids
state transition model
substation power systems
Substations
System recovery
transmission line overflow
value and policy iteration
value iteration techniques
Decision Making
cyber physical systems
attack escalation
automatic decision making engine
automatic optimal response systems
Cascading Failures
Computational modeling
cyber-physical decision support system
cyber-physical systems
cyberattack
CPS resilience
Decision support systems
Engines
hybrid cyber-physical states
Markov Decision Process
Markov processes
MDP
optimal response
policy iteration techniques
power engineering computing
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »