Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Markov processes
biblio
Analysis on Convergence of Stochastic Processes in Cloud Computing Models
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
cloud computing models
Stochastic computing
Stochastic Process
stochastic matrix
stochastic matrices
resource allocations
Rate of Convergence
matrix-defined systems
matrix algebra
Markov processes
complicated model
common stochastic processes
cloud computing systems
Cloud Computing
arbitrary stochastic processes
Eigenvalues and eigenfunctions
Biological system modeling
Steady-state
convergence
Stochastic processes
resource allocation
Scalability
Resiliency
pubcrawl
Computational modeling
security
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
Diagnostics and Assessment of the Industrial Network Security Expert System
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
LPτ-sequence
Vulnerability
Software
security
Scalability
Resiliency
resilience
pubcrawl
nodal points
network security
Monte Carlo numerical method
Monte Carlo methods
Mathematical model
Markov processes
markov chain
manufacturing
Algorithm design and analysis
information security
Industrial Safety
industrial network virtual model
industrial network security expert system
Industrial engineering
Human behavior
expert systems
expert assessment
diagnostic system
diagnostic assessment
cyber-attacks sets
cyber-attacks classification
cyber-attack
computer network security
classification
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
DNS graph mining for malicious domain detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
multiple malicious domains
IP resolutions
labeled domains
malicious domain detection technique
malicious probabilities
Malware Analysis
malware detection
Markov processes
message passing
Metrics
IP networks
Nickel
potential malicious domains
privacy
probability
pubcrawl
resilience
Resiliency
variety cyber attacks
graph mining
belief propagation
belief propagation algorithm
computer network security
cyber security
Data mining
DNS data servers
DNS graph mining
Domain Resolution
Graph Interface
attackers
graph mining task
graph node
graph theory
graph-based interface
Human behavior
Inference algorithms
internet
invasive software
biblio
A graph theoretic approach to fast and accurate malware detection
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
Malware Analysis
unknown malware
storage space
storage management
Robustness
Resiliency
resilience
pubcrawl
privacy
obfuscation attacks
nonsignature malware detection schemes
Metrics
Markov processes
benign software
malware
invasive software
Human behavior
GZero
graph theory
graph theoretic approach
feature extraction
false positive rate
detection time
Databases
Complexity theory
biblio
Detection of malicious nodes in NDN VANET for Interest Packet Popple Broadcast Diffusion Attack
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
packet popple broadcast diffusion attack
Vehicular Ad-hoc Network
vehicular ad hoc networks
telecommunication security
Scalability
Roads
Resiliency
resilience
pubcrawl
Predictive models
Ports (Computers)
PBDA
Analytical models
next generation networks
NDN VANET
named data networking
Named Data Network Security
Mitigation strategy
Markov processes
markov chain
internet
Interest Packet Popple Broadcast Diffusion Attack
Human behavior
biblio
SysPal: System-Guided Pattern Locks for Android
Submitted by grigby1 on Thu, 06/07/2018 - 1:58pm
pattern locks
usability
system-guided pattern locks
SysPal policies
smart phones
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Android pattern lock
Password selection policy
password
mobile computing
Meters
Markov processes
Humanoid robots
Human behavior
Androids
Android screen lock patterns security
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
A Markov Game Theoritic Approach for Power Grid Security
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Metrics
user authentication information steal
two-player zero-sum Markov game theoretic approach
security of data
Scalability
Resiliency
resilience
pubcrawl
power system security
power grids
Power Grid Security
power engineering computing
advanced persistent threat
Markov processes
Markov game
information and communication technology
Human behavior
graph theory
Games
game theory
cyber-attack
Companies
Analytical models
advanced persistent threats
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »