Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
High Speed Device-Independent Quantum Random Number Generation without Detection Loophole
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
probability
Toeplitz matrix hashing
statistical fluctuations
Scalability
Resiliency
resilience
random processes
random number generation
random key generation
Quantum entanglement
quantum cryptography
pubcrawl
Bell theorem
Photonics
Metrics
Human behavior
Fluctuations
final random bit rate
Entropy
entangled photons
device-independent quantum random number generation
detection-loophole free Bell test
detection loophole
bit rate 114.0 bit/s
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by aekwall on Mon, 06/10/2019 - 10:17am
Resiliency
wireless sensor networks
user security
traffic morphing
traffic analysis attack mitigation
telecommunication traffic
telecommunication security
telecommunication network routing
splitting traffic
Smartphones
smartphone sales
smartphone apps
smart phones
security
Routing
Ad hoc networks
Relays
pubcrawl
probability
privacy
multipath routing scheme
mobile computing
mobile ad hoc networks
Metrics
MANET Attack Mitigation
identifying apps
flow routing optimization problem
edge network assistance
data privacy
composability
biblio
SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
MANET security
SYN flood attack
Servers
Routing
Resiliency
pubcrawl
probability
Monitoring
mobile ad hoc networks
Metrics
Artificial Intelligence
MANET Attack Detection
MANET
Floods
Firewalls (computing)
Compositionality
composability
Clustering algorithms
Bay Estimator
biblio
Modeling of Information Processes for Modern Information System Security Assessment
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Information systems
security of information systems
security of data
Scalability
Resiliency
resilience
pubcrawl
Probability distribution
Probability density function
probability
policy-based governance
modeling conflict
Metrics
information theoretic security
automata
information system security assessment
information security
information influence modeling
hybrid automatons
Human Factors
Human behavior
estimation
conflict processes analysis
composability
collaboration
cellular automatons
automata theory
biblio
Grey Zone in Pre-Silicon Hardware Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Trust-Hub
Trojan horses
trojan horse detection
Silicon
Si
pubcrawl
probability
pre-silicon hardware trojan detection method
Pre-Silicon Hardware Trojan Detection
machine learning
low signal probability
learning (artificial intelligence)
activation probability
integrated circuit testing
integrated circuit design
hardware Trojan benchmark circuits
Hardware
grey zone
functional test
elemental semiconductors
electronic engineering computing
benchmark
behaviour simulations
Behaviour Simulation
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A quantifiable Attack-Defense Trees model for APT attack
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
trees (mathematics)
probability
network attack
expert systems
Eigenvalues and eigenfunctions
attack-defense trees model
Attack-Defense Trees
APT attack
advanced persistent threat attacks
advanced persistent threats
security
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Buildings
Analytical models
security of data
analytic hierarchy process
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »