Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers
Submitted by grigby1 on Fri, 08/04/2023 - 10:16am
security
pubcrawl
Human behavior
Human Factors
Metrics
Scalability
Games
Nash Equilibrium
Bayes methods
heterogeneous networks
Costs
Bayesian game
game theoretic security
US Department of Homeland Security
network protection
non-zero-sum game
biblio
LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach
Submitted by grigby1 on Fri, 07/21/2023 - 1:16pm
Training
security
pubcrawl
policy-based governance
collaboration
Scalability
authentication
Probabilistic logic
resilience
Bayes methods
Resiliency
user experience
false trust
Behavioral sciences
biblio
Trust Management Model of VANETs Based on Machine Learning and Active Detection Technology
Submitted by grigby1 on Fri, 07/21/2023 - 1:13pm
resilience
active detection
Behavioral sciences
false trust
Resiliency
Bayes methods
Trust management
vehicular ad hoc networks
simulation
machine learning
blockchain
VANETs
Scalability
Filtering
Conferences
collaboration
policy-based governance
pubcrawl
biblio
Differential Privacy High-dimensional Data Publishing Method Based on Bayesian Network
Submitted by grigby1 on Fri, 06/30/2023 - 2:46pm
composability
maximum information coefficient
high-dimensional data publishing
elastic privacy budget allocation
Bayesian network
Bayes methods
Publishing
differential privacy
Training data
Support vector machines
privacy
Scalability
Correlation
Resiliency
resilience
Human behavior
pubcrawl
biblio
Multi-fidelity Bayesian Optimization for Co-design of Resilient Cyber-Physical Systems
Submitted by grigby1 on Fri, 06/09/2023 - 12:47pm
pubcrawl
resilience
Resiliency
Data models
Biological system modeling
control systems
cyber-physical systems
Probabilistic logic
CPS
Economics
Bayes methods
Bayesian optimization
co-design
Cyber-Physical Resilience
biblio
Deterministic Ziv-Zakai Bound for Compressive Time Delay Estimation
Submitted by grigby1 on Fri, 04/28/2023 - 11:54am
simulation
Ziv-Zakai bound
time delay estimation
Bayesian estimation
compressive sampling
compressive sensing
cyber-physical system
mean square error
Radar
Bayes methods
pubcrawl
Delay effects
Receivers
sensors
composability
estimation
privacy
Resiliency
resilience
biblio
Alarm Correlation Method Using Bayesian Network in Telecommunications Networks
Submitted by grigby1 on Fri, 03/31/2023 - 7:26am
belief networks
Monitoring
pubcrawl
Metrics
Correlation
Topology
information technology
network topology
Telecommunications
Bayes methods
Bayesian network
Alarm Correlation
fault diagnosis
network operation
Root cause analysis
biblio
Security Risk Assessment of Information Systems in an Indeterminate Environment
Submitted by grigby1 on Fri, 08/26/2022 - 9:58am
information systems security
uncertainty
tools
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Information systems
Human behavior
Fuzzy Inference Scheme
expert systems
Computational modeling
Bayesian belief network
Bayes methods
biblio
Improving Classification Trustworthiness in Random Forests
Submitted by grigby1 on Wed, 08/03/2022 - 3:13pm
machine learning algorithms
pubcrawl
Conferences
Medical services
Computer crime
composability
Reliability
trustworthiness
Bayes methods
random forests
Bayesian networks
Classification Trustworthiness
Clinical Decision Support Systems
biblio
Adaptation of the Multi-pass social Engineering Attack Model Taking into Account Informational Influence
Submitted by aekwall on Wed, 03/23/2022 - 8:35am
security
Organizations
Computational modeling
Mathematical model
Analytical models
Scalability
Human behavior
Bayes methods
Adaptation models
pubcrawl
intensity of users interaction
model of informational influence
Social Engineering Attacks
social graphs
Social Agents
1
2
3
4
5
6
7
8
9
…
next ›
last »