Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
defense strategies
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
biblio
Privacy and Security of Big Data in AI Systems: A Research and Standards Perspective
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
countermeasures
Standards Developing Organizations
security of data
security
SDOs
Resiliency
privacy
IEC standards
Human behavior
defense strategies
data privacy
Data models
big data privacy
big data security
Big Data
artificial intelligence systems
Artificial Intelligence
AI systems developments
AI
Metrics
Scalability
resilience
Human Factors
pubcrawl
biblio
A New Hardware Logic Circuit for Evaluating Multi-Processor Chip Security
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
manufacturing processes
research hotspots
replay-type hardware Trojan
on-chip systems
NoC vulnerability
NoC power consumption
NoC hardware security
NoC
new hardware logic circuit
network-on-chip
network throughput reduction
multiprocessor chip security
multiprocessing systems
pubcrawl
logic circuits
invasive software
inter-core interconnection method
Integrated circuit interconnections
defense strategies
communication performance optimization
benchmark test set
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
Submitted by grigby1 on Thu, 03/28/2019 - 3:15pm
defense strategies
signature based defense
tagging
suspicious information
signature-based antivirus systems
refinable attack investigation framework
realworld attack dataset
RAIN framework
optimal adversary
nonadversarial information tracking
multistage game
memory overhead
information flow passes
dynamic information flow tracking games
DIFT games
security
adversarial information flows
Resiliency
Cyber Attacks
firewalls
Stochastic processes
game theory
Scalability
pubcrawl
Monitoring
resilience
Games
Computational modeling
Analytical models
security of data
biblio
A game-theoretic defense against data poisoning attacks in distributed support vector machines
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Resiliency
machine learning
multi-sensor classification
Nash Equilibrium
networked systems
pattern classification
prediction tasks
pubcrawl
resilience
learning algorithms
resilient DSVM algorithm
Scalability
secure DSVM algorithm
sensor fusion
sensors
Support vector machines
Training
DSVMs
Algorithm design and analysis
Computer crime
control units
data poisoning attacks
defense strategies
distributed algorithms
distributed support vector machines
DSVM learner
AI Poisoning
dynamic distributed algorithms
game theory
game-theoretic defense
game-theoretic framework
Games
Human behavior
learning (artificial intelligence)
biblio
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
distributed denial-of-service attacks
thermal properties
Temperature distribution
Servers
server downtime prevention
power aware computing
network simulation
network management protocols
Monitoring
HVAC systems
HVAC
heating-ventilation-and-air-conditioning systems
Heating
Cloud Computing
defense strategies
DDoS Attack
Data models
data center meltdown
Data center communications
Cooling
computer network security
computer network management
Computer crime
computer centres
cloud services