Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
probability
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
pubcrawl
Website fingerprinting attack
Web sites
Web site fingerprinting attack
traffic analysis attack
Tor
telecommunication traffic
streaming algorithm
statistical flow-based network traffic features
Scalability
Resiliency
representative data stream classification algorithms
concept drift
probability
policy-based governance
pattern classification
online front-ends
Metrics
learning (artificial intelligence)
Human behavior
dynamic Web sites
data privacy
cryptology
biblio
Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
machine learning method
Training
telecommunication traffic
Scalability
Resiliency
resilience
quality of user service
pubcrawl
probability
Peer-to-peer computing
pattern matching
network traffic monitoring
network traffic identification method
network traffic identification
application traffic
machine learning algorithms
machine learning
learning (artificial intelligence)
Inspection
encryption
dpi
deep packet inspection technology
deep packet inspection
data analysis
Cryptography
computer network security
computer network management
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
Quantum Low Probability of Intercept
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
Metropolitan area networks
telecommunication security
Resiliency
resilience
Receivers
quantum low probability of intercept
pubcrawl
probability
Photonics
optical fibre networks
optical fiber
OCIS codes
Monitoring
metropolitan-area distances
(060.1660) Coherent communications
Metrics
forward error correction
error probability
eavesdropping
eavesdropper
decryption key
Cryptography
composability
Ciphertext
Brightness
(270.5568) Quantum cryptography
(270.5565) Quantum communications
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 11:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »