Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Human interactive machine learning for trust in teams of autonomous robots
Submitted by K_Hooper on Wed, 02/14/2018 - 12:02pm
interactive systems
unmanned vehicles
Unmanned Systems
Training
supervisory control
robots
pubcrawl
neuroevolutionary machine-learning techniques
multi-robot systems
mobile robots
ML behavior
machine learning algorithms
machine learning
learning (artificial intelligence)
automation
IML-generated search plans
human-robot interaction
human trust
human interactive machine learning
Human behavior
Human automation interaction
Conferences
Computers
command and control systems
black box algorithms
autonomous team behaviors
autonomous robot teams
biblio
Testbed for security orchestration in a network function virtualization environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
normal network traffic
virtualisation
virtual reality
testbed implementation
telecommunication traffic
telecommunication security
targeted attacks
security orchestration
security of data
Scalability
responses
Resiliency
quality of service
pubcrawl
orchestrate virtualized network functions
machine learning
network quality of service
network function virtualization environment
network function virtualization
Metrics
learning (artificial intelligence)
intelligent response
Human behavior
DDoS
Conferences
computer network security
Computer crime
Cloud Computing
artificial intelligence security
adverse network conditions
biblio
Preventing Collusion between SDN Defenders Anc Attackers Using a Game Theoretical Approach
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
preventing collusion
software defined networking
socio-rational approach
Silicon
SDN defenders
SDN controller
Resiliency
reputation system
repeated-game setting
Reconnaissance
pubcrawl
anti-collusion solution
Network reconnaissance
Games
game-theoretical solution concept
game theory
game theoretical approach
control systems
Conferences
computer network security
Computer crime
collusion attack
biblio
Random Projection Data Perturbation Based Privacy Protection in WSNs
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
PPND algorithm
wireless sensor networks
telecommunication security
Sparse projection data perturbation
Sparse matrices
SMART algorithm
security
Resiliency
random projection data perturbation based privacy protection
pubcrawl
privacy protection requirements
privacy preserving
pre-distribution random number
Algorithm design and analysis
node privacy
Network reconnaissance
network coverage area
data traffic
data privacy protection mechanism
data privacy
Data integration
data fusion technology
data fusion algorithm
data fusion
Conferences
biblio
A Multi-Level Security Access Control Framework for Cross-Domain Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
Ubiquitous Computing Security
target domain
simulation
secure interactions
Scalability
Resiliency
pubcrawl
Organizations
network domains
multilevel security protection
multilevel security access control framework
multilevel mapping method
Multi-Level Security
Access Control
mapping method
intradomains
inter-domain mapping
information science
Human Factors
Human behavior
hierarchical access control structures
Data protection
cross-domain networks
cross-domain
Conferences
Computational modeling
authorisation
biblio
BMNR: Design and Implementation a Benchmark for Metrics of Network Robustness
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
big data security metrics
BMNR
Conferences
graph attack
graph generator
graph theory
Hybrid electric vehicles
Metrics
network robustness
pubcrawl
Resiliency
robustness metric evaluation
Scalability
social networking (online)
biblio
Analysis of software security testing using metaheuristic search technique
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
program testing
testing
tabu search
software security testing analysis
software assurance
Software
simulated annealing
security of data
security
search problems
Search Based Testing
Search Based Engineering
Scalability
pubcrawl
composability
particle swarm optimization techniques
particle swarm optimisation
metaheuristic search technique
metaheuristic
hill climbing
heuristic search technique
heuristic
genomics
genetic algorithms
genetic algorithm
fitness function
cost effective
Conferences
biblio
A study of intellectual property protection for mass innovation spaces
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
ip protection
Technological innovation
standards
Resiliency
pubcrawl
policy-based governance
Policy
patents
mass innovation space innovative development
Mass Innovation Space
mass entrepreneurship and innovation
Law
collaboration
Intellectual Property Service Standards
Intellectual Property Protection
intellectual property
intellectual cluster management innovation
innovation management
industrial property
industrial economics
Entrepreneurship
economic model
Conferences
composability
biblio
Advanced biometric home security system using digital signature and DNA cryptography
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
home automation
Technological innovation
smart cards
Smart card
Resiliency
pubcrawl
privacy
multifeature biometric traits
Metrics
Medical services
integrated digital signature
Human behavior
advanced biometric home security system
Geo-Detection
DNA cryptography
DNA
digital signatures
digital signature
Cryptography
Conferences
biometrics (access control)
authorisation
authentication
advanced security system
biblio
A signaling game model for moving target defense
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
Metrics
uncertainty
traditional defense techniques
strategic information disclosure
stealthy attacks
static approach
signaling scheme
signaling game model
Servers
security of data
Resiliency
pubcrawl
passive defense approach
MTD strategy
moving target defense
attack cost-complexity
information asymmetry
incentive-driven advanced attacks
highly adaptive attacks
Games
game theory
fixed attack type
Face
efficient active defense
Cyber-security
Conferences
Computational modeling
Bayesian Stackelberg game model
Bayes methods
« first
‹ previous
…
72
73
74
75
76
77
78
79
80
next ›
last »