Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probabilistic logic
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
An MEBN framework as a dynamic firewall's knowledge flow architecture
Submitted by BrandonB on Wed, 05/06/2015 - 8:21am
MEBN framework
statistical distributions
stateless traditional static filters
stateful inspection
Signal processing algorithms
Semantics
semantic threat graph
security features
Probability distribution
probabilistic ontology
Probabilistic logic
ontologies (artificial intelligence)
Ontologies
multi entity Bayesian networks
MEBN logic
Bayes methods
MEBN
knowledge flow architecture
graphical models
futuristic threat prevention technique
first order theory
firewalls
feature extraction
explicit rule inclusion
dynamic firewalls
data flow computing
data flow architecture
belief networks
Bayesian networks
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 8:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
moving-target defense
VM migration-snapshotting
uncertainty
simulation
service attack surface
security of data
security
S-shaped generalized logistic function
risk modeling
replacement pool
Probes
probability
probabilistic MTD service deployment
Probabilistic logic
probabilistic algorithm
moving-target defense strategy
attack-surface heterogeneity-and-dynamics awareness
Mathematical model
Information systems
homogeneity problem
heterogeneous attack surfaces
Equations
dynamic probability
dynamic attack surfaces
diversity-compatibility
deep automation
configuration staticity
cloud-specific features
cloud-based service security
cloud infrastructures
Cloud Computing
attacker intelligence
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 8:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Submitted by BrandonB on Thu, 04/30/2015 - 12:21pm
Intermediate System
TTL
Servers
Round Trip Time (RTT)
Receivers
Probabilistic logic
probabilistic hop count filtering
probabilistic HCF techniques
packet filtering
network bandwidth jam
mitigation techniques
MATLAB 7
IP spoofing
IP networks
IP addresses
Broadband communication
information filtering
illegitimate packet filtering
host resources exhaustion
Hop Count Filtering (HCF)
Hop Count
Educational institutions
DPHCF-RTT packet filtering technique
Distributed Probabilistic HCF (DPHCF)
distributed probabilistic HCF
distributed DoS attacks
DDoS
conventional hop count filtering
conventional HCF techniques
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9