Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Research on Automatic Generation and Analysis Technology of Network Attack Graph
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Network Security Reinforcement
security of data
Resiliency
pubcrawl
Probability-based Network Vulnerability Measurement
probability
Predictive Metrics
optimization
optimisation
network vulnerability index
network security reinforcement algorithm
Microelectronics
network security metrics
network attack graph
graph theory
edge authority attack graph
dependence attack graph
composability
automatic generation
attack target asset value
attack graphs
security
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 4:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
fuzzy technologies
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
differential equations
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
Trojan horses
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
cyberattack
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
biblio
The Design of S-box Based on Combined Chaotic Map
Submitted by aekwall on Mon, 01/18/2021 - 11:23am
S-box
substitution box
S-box construction method
one-dimension chaotic map
nonlinear component
logistic map
lightweight block cipher
combined chaotic map
sine map
Scalability
cryptographic algorithm
chaotic cryptography
chaos
probability
Metrics
pubcrawl
Resiliency
Cryptography
biblio
A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
Submitted by grigby1 on Fri, 01/15/2021 - 12:01pm
generative adversarial networks
video-realistic generation techniques
Video Forensics
Universal Background Model
two-step synthetic face image detection method
synthetic images
synthetic face generation methods
PixelCNN
photo-realistic generation techniques
neural conditional distribution modelling
generalizable Deepfake detector
Face detection
conditional probabilities
anomaly detector
faces
DeepFake
Training
Probability distribution
probability
deep neural networks
face recognition
resilience
Task Analysis
neural nets
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
feature extraction
biblio
Anomaly Detection Algorithm Based on Global Object Map for Video Surveillance System
Submitted by grigby1 on Mon, 01/11/2021 - 2:02pm
deep video
surveillance
Servers
security
Scalability
resilience
pubcrawl
probability
pedestrian anomaly
video surveillance
deep learning
Cameras
automobiles
abnormal detection
Resiliency
Metrics
Human behavior
biblio
Anomaly Detection in Video Data Based on Probabilistic Latent Space Models
Submitted by grigby1 on Mon, 12/28/2020 - 12:48pm
particle filtering (numerical methods)
video signal processing
video sequences
video frames
video data
vehicles
Variational autoencoder
semiautonomous vehicle
security of data
Scalability
robot vision
Resiliency
resilience
pubcrawl
probability
probabilistic latent space models
Adapted Markov Jump Particle Filter
particle filtering
object detection
neural nets
multimodal architecture
mobile robots
Metrics
Markov processes
latent space information generation
Kalman filtering
image sequences
discrete inference levels
continuous inference levels
autonomous vehicles
Anomaly Detection
adaptive filtering
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »