Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Response Time Analysis for Explainability of Visual Processing in CNNs
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
explainable artificial intelligence methods
visual processing
visual learning tasks
variable RTs
response times
MSDNet
model architecture
intrascene object-object relationships
hierarchical representations
early-exit architecture
dynamic inference models
conditional computation model
cognitive psychology
CNNs
Scalability
xai
Semantics
Syntactics
visualization
Object recognition
Analytical models
convolutional neural nets
Grammar
Computational modeling
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 3:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis
Submitted by grigby1 on Mon, 02/08/2021 - 1:02pm
grey correlation analysis
security
Scalability
Resiliency
resilience
pubcrawl
pixel detection
people vision
Metrics
Mathematical model
Image resolution
Image edge detection
grey systems
grey image edge detection
adaptive algorithm
edge pixel
edge map
edge detection
differential equations
Detectors
Correlation
composability
automatic threshold
area pixels
Analytical models
Algorithm design and analysis
adaptive threshold
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
cyber-physical system
tunnels
system components
synthesis problem
supervisory controller
supervisor synthesis
required computational time
reduced order systems
model reduction steps
lengthy synthesis procedures
even unsolvable synthesis procedures
dependency graphs
Cyber Dependencies
Discrete-Event Systems
Scalability
discrete event systems
actuators
Compositionality
Human Factors
data visualisation
automata
sensors
cyber-physical systems
Analytical models
Metrics
graph theory
pubcrawl
Resiliency
biblio
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
naval CPS
Anomalies
CPS anomalies
cyber-physical system
data and information quality
data streams
data-driven decision system
digital subsystems
information quality measures vectors
Marine vehicles
naval cyber-physical anomaly propagation analysis
naval engineering computing
naval propulsion management system
optimized supervisory control
programmable logical controller
propagation analysis
quality assessed graph
system graph
Analytical models
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
graph theory
Computational modeling
Metrics
security of data
cyber-attacks
Anomaly Detection
sensors
Human Factors
Compositionality
programmable controllers
navigation
Cyber Dependencies
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
similarity measure
security
security analysts
security of data
semantic analysis
semantic links
Semantics
shared information
similarity degree
Scalability
similarity measure approach
Software
standards
statistical characteristics
threat intelligence
three-layer model
tracking attacks
adversary behaviors
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
Meta path
Knowledge engineering
Human behavior
complex networks
community groups
Community discovery
Biological system modeling
APT groups
Analytical models
Adversary Models
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Human behavior
usability
tools
security
resilience
Metrics
malware
machine learning
Human Factors
Security Heuristics
Government
composability
Analytical models
Air gaps
pubcrawl
predictability
Scalability
Resiliency
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »