Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
Second Level Steganalysis - Embeding Location Detection Using Machine Learning
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
Cloud Computing
composability
Data mining
digital images
discrete cosine transforms
feature extraction
machine learning
Markov processes
Metrics
privacy
pubcrawl
steganalysis
Steganography
steganography detection
Transform coding
biblio
Rapid Security Situation Prediction of Smart Grid Based on Markov Chain
Submitted by aekwall on Mon, 02/10/2020 - 10:42am
pubcrawl
system state prediction
system state distribution
state transition matrix
state probability distribution
smart power grids
smart power grid
smart grid stability
smart grid security
Situation Transition Probability Matrix
Situation Prediction
sequential Monte Carlo method
security assessment
Scalability
Resiliency
rapid security situation prediction
automation
probability
Predictive Metrics
power system stability
Monte Carlo methods
Microelectronics Security
Metrics
Matlab program
Markov state transition probability matrix
Markov processes
Markov Mode
Markov chain analysis method
Conferences
composability
component state transition probability matrix
component state prediction
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
Metrics
technical diagnostics
storage management
Software
smart business center diagnostics
Servers
server
SBC server protection
SBC network
Resiliency
resilience
Random access memory
pubcrawl
prevention methods
network servers
authentication
Markov processes
Markov model
IoT server availability
Internet of Things
Industrial Internet of Things
Human behavior
encryption
dependability
DDoS-attacks
DDoS-attack
DDoS Attack Prevention
Databases
computer network security
composability
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
Markov sources
Joint Source Channel Network scheme
JSCN coding
LDPC channel code
LDPC codes
LDPC source code
LDPC-based joint source-channel-network coding
MARC setup
MARC system
Joint Source Channel Network LDPC codes
multiple access relay channel
noise figure 5.0 dB
source coding
source data
source nodes
sources-relay data
sources-relay links
Markov processes
pubcrawl
composability
Metrics
Decoding
channel coding
iterative decoding
parity check codes
Relays
Resiliency
combined source-channel coding
network coding
compressed symbols
conventional LDPC code
decoding scheme
destination nodes
iterative joint decoding algorithm
biblio
Optimal Privacy-Enhancing And Cost-Efficient Energy Management Strategies For Smart Grid Consumers
Submitted by aekwall on Mon, 06/24/2019 - 2:05pm
pubcrawl
Metrics
optimal energy management strategies
optimal privacy-enhancement
optimal solution
policy-based governance
privacy
Privacy Risk
privacy-cost trade-off
privacy-enhancement
Markov processes
Resiliency
signal processing
Smart Grid Consumeer Privacy
smart grid consumer privacy
smart grid consumers
Smart metering system
smart power grids
standards
unauthorized testing
energy cost
Bellman dynamic programming
Conferences
consumer behavior
consumer privacy
cost-efficient energy management strategies
data privacy
decision theory
design problem
dynamic programming
belief state Markov decision process problem
energy management
energy management systems
Energy storage
Human behavior
kullback-leibler divergence
Kullback-Leibler divergence rate
Markov Decision Process
Markov decision process framework
biblio
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
Submitted by grigby1 on Fri, 04/05/2019 - 9:29am
Scalability
pubcrawl
QoS
QoS as a service paradigm
quality of service
Relays
reputation
resilience
Resiliency
probabilistic fake VIP attack strategy
Servers
signature detection cost
Stackelberg game
Stackelberg game setting
trust
trust strategy
two-dimensional Markov chains
best-response fake VIP attack strategy
Markov processes
intelligent fake VIP attacks
handwriting recognition
Games
game theory
Fake VIP attack
double-blind reputation scheme
digital signatures
demanded QoS level
demand undue QoS level
cloud-assisted interactions
Cloud Computing
client-server systems
client-server interactions
Chained Attacks
biblio
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
power system measurement
CPS
cyber layer
cyber-physical security
defending strategies
effective defense strategies
physical damage
Physical layer
physical system
Markov processes
Power system protection
stochastic game approach
stochastic games
system operator
value iteration
wide-area monitoring
zero-sum Markov game
Stochastic computing
cyber-physical systems
security of data
Games
pubcrawl
Resiliency
Scalability
Conferences
Nash Equilibrium
cyber attack
security
power engineering computing
power system security
game-theoretic approach
cyber-physical system
Smart Grids
smart power grids
Smart Grid
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »