Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probabilistic logic
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
Trusted Recomendation System Based on Level of Trust(TRS_LoT)
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
Accuracy
Companies
composability
indexing
information retrieval
Probabilistic logic
pubcrawl
recommendation
recommender systems
Reliability
resilience
Resiliency
Trusted recommendation system
web of trust
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Security in Heterogeneous Distributed Storage Systems: A Practically Achievable Information-Theoretic Approach
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
pubcrawl
malicious user security
Measurement
Metrics
perfect secrecy
Probabilistic logic
Probabilistic Model Checker
Probabilistic Model Checking
probability
information-theoretic security
Reliability
reliability assessment
resilience
Resiliency
security
Security Metrics
spread spectrum communication
attack algorithms
information theory
heterogeneous distributed storage system security
formal verification
erasure codes
encryption
distributed storage systems
distributed memory systems
Cryptography
cryptographic/information-theoretic approach
Computing Theory
Compositionality
coding theory
classical cryptographic approach
caching systems
cache storage
biblio
Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Openflow firewall
Smart Grids
smart grid security
Smart Grid
Scalability
Resiliency
resilience
pubcrawl
Probabilistic Model Checking
Probabilistic logic
advanced metering infrastructure
Metrics
Mathematical model
Markov processes
Markov Decision Process
Firewalls (computing)
distributed denial of service
Computer crime
Analytical models
biblio
Ranking Causal Anomalies by Modeling Local Propagations on Networked Systems
Submitted by grigby1 on Thu, 02/15/2018 - 10:47am
matrix factorization
Time series analysis
system failure status
single fault propagation
security of data
Resiliency
resilience
pubcrawl
Probabilistic logic
probabilistic clustering
pattern clustering
networked systems
multiple fault diagnosis
Monitoring
Metrics
causal anomaly detection
low-rank network diffusion model
large-scale complex systems
invariant network
Indexes
Human Factors
human factor
Human behavior
global fault propagation
fault diagnosis
debugging
complex systems
complex system behaviors
Clustering algorithms
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
biblio
Advances and challenges of quantitative verification and synthesis for cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Monitoring
Wearable devices
software reliability
Software
self-driving cars
Science of Security
Scalability
safety-critical software
safety critical contexts
robotic assistants
Resiliency
Quantitative Verification
pubcrawl
Probabilistic logic
Policy-Governed Secure Collaboration
Adaptation models
Metrics
Markov processes
internet
implantable devices
Human Factors
Human behavior
formal verification
factory automation systems
cyber-physical systems
composability
collaboration
business-critical contexts
Biomedical monitoring
biblio
A Collective, Probabilistic Approach to Schema Mapping
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
metadata
uncertainty handling
schema mapping optimization problem
Scalability
Resiliency
pubcrawl
probability
probabilistic reasoning techniques
probabilistic reasoning
Probabilistic logic
optimization
metadata-only approaches
Metadata Discovery Problem
metadata constraints
CMD
meta data
mapping selection
inference mechanisms
data structures
Data mining
Data engineering
Conferences
Compositionality
Companies
collective probabilistic schema mapping approach
collective mapping discovery
cognition
biblio
Volumetric Bias in Segmentation and Reconstruction: Secrets and Solutions
Submitted by grigby1 on Wed, 03/08/2017 - 12:55pm
optimisation
volumetric bias
standards
standard likelihood term
segmentation method
reconstruction method
pubcrawl170110
probability
Probabilistic logic
probabilistic K-means energy
Optimization methods
binary optimization technique
multilabel optimization technique
ML model estimates
maximum likelihood estimation
KL divergence
image segmentation
Image reconstruction
Entropy
computer vision
Computational modeling
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »