Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probabilistic logic
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Heuristics-Based Multi-Agent Task Allocation for Resilient Operations
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
pre-requisite
Markovian assumptions
Markovian state information
modeling probabilistic failure
natural world
navigation
nonMarkovian setting
nonMarkovian state modeling
novel heuristic
intelligent task assignment
real-world systems
realistic state
rescue robots
resilient operations
SAR
uncertainty modeling
Security Heuristics
predictability
Probabilistic logic
Task Analysis
Resiliency
pubcrawl
resource management
multi-robot systems
multi-agent systems
robots
uncertainty
Scalability
Markov processes
Linear programming
agent failure
complex environments
heuristics-based multiagent task allocation
imulated search and rescue mission
inherent challenges
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
Security Analytics For Heterogeneous Web
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
Probabilistic Arithmetic Automata(PAA)
web services
web applications
vulnerability detection tools
tools
threat vectors
SVM classifier
Support vector machines
Support Vector Machine (SVM) Classifier
security of data
security analytics
security
reconfigurable PAA
pubcrawl
Probabilistic logic
business data processing
proactive behavior
privacy
pattern classification
Metrics
Measurement
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
heterogeneous Web
feature extraction
dynamic PAA
data analysis
biblio
Towards probabilistic identification of zero-day attack paths
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
Predictive Metrics
Zero Day Attacks and Defense
zero-day attack paths
ZePro
sockets
probabilistic identification
object instance graph
intrusion propagation
enterprise network security defense
Bayesian network
belief networks
computer network security
Communication networks
probability
Probabilistic logic
composability
pubcrawl
Resiliency
feature extraction
Bayes methods
security
Conferences
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
optimization
test
Solovey-Strassen fast exponentiation probablistic test binary algorithm
Solovey-Strassen
Software algorithms
Scalability
Resiliency
pubcrawl
probability test
probability
Probabilistic logic
Algorithm
Jacobian matrices
Jacobi symbol
Information systems
Fermat's little theorem
Fermat
exponentiation
C\# programming language
C\# languages
Cryptography
binary exponentiation
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 9:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
Servers
NS3 simulation
Probabilistic logic
pubcrawl
re-transition timeout mechanism
resilience
Resiliency
Routing protocols
Scalability
NS-3 Simulation
sigmoid filter optimization
TCP congestion control window algorithm
TCP packet size
telecommunication congestion control
telecommunication traffic
threshold bandwidth filter
transport protocols
attacker traffic
network efficiency
MATLAB
low-rate DoS attack detection
low-rate denial of service attack detection
low-rate bandwidth
Human Factors
honey-pot server
honey pots
high rate attacks
filtering theory
distributed DoS
denial of service (dos)
computer network security
Computer crime
Bandwidth
biblio
An Efficient CPA-Secure Encryption Scheme with Equality Test
Submitted by grigby1 on Fri, 09/28/2018 - 3:20pm
multiplicative homomorphism
zero knowledge proof
Resiliency
resilience
public key solutions
public key cryptography
Public key
pubcrawl
Protocols
Probabilistic logic
OW-CPA security
outsourcing
noninteractive zero knowledge proof of discrete log
comparable ciphertext
message encryption
IND-CPA security
Homomorphic encryption
equality test token
encryption scheme with equality test
encryption
ElGamal encryption
efficient encryption
efficient CPA-secure encryption scheme
data outsourcing scenario
cyber physical systems
composability
biblio
Symbolic execution and probabilistic reasoning
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
Systematics
systematic program analysis technique
symbolic path conditions
software system security
software system safety
program paths
program behaviors
probabilistic reasoning
event occurrence probability
Computing Theory
cognition
Probabilistic logic
Security Metrics
reliability theory
Metrics
Atmospheric modeling
inference mechanisms
probability
Software systems
program diagnostics
Computational modeling
safety-critical software
Symbolic Execution
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »