Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
An MEBN framework as a dynamic firewall's knowledge flow architecture
Submitted by BrandonB on Wed, 05/06/2015 - 9:21am
MEBN framework
statistical distributions
stateless traditional static filters
stateful inspection
Signal processing algorithms
Semantics
semantic threat graph
security features
Probability distribution
probabilistic ontology
Probabilistic logic
ontologies (artificial intelligence)
Ontologies
multi entity Bayesian networks
MEBN logic
Bayes methods
MEBN
knowledge flow architecture
graphical models
futuristic threat prevention technique
first order theory
firewalls
feature extraction
explicit rule inclusion
dynamic firewalls
data flow computing
data flow architecture
belief networks
Bayesian networks
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 12:40pm
risk management
power grids
Power measurement
power network configuration
power operators
power system control
power system security
power-grid control networks
power-grid Infrastructures
power engineering computing
security
security assessment techniques
security-oriented stochastic risk management technique
situational awareness
Smart Grids
stochastic Bayesian network models
Stochastic processes
Bayes methods
operating system assets
numerical indices
Intrusion Detection Systems
interprocess communications
Indexes
graph-theoretic power system indexing algorithm
graph theory
Generators
cyber-side instrumentation probes
cyber-physical vulnerability assessment
cyber-physical systems
Cyber-physical security metrics
cyber-physical security indices
cyber-physical critical infrastructures
CPIndex
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
biblio
Evaluation of Bayesian and Dempster-Shafer approaches to fusion of video surveillance information
Submitted by BrandonB on Fri, 05/01/2015 - 9:39am
Kelly betting strategy
video surveillance information fusion
video surveillance
vehicles
vehicle reidentification
vehicle
uncertainty
traffic engineering computing
statistical parametric fusion methods
Shape
road vehicles
probability
probabilistic estimates
Mathematical model
Accuracy
inference mechanisms
fusion
evaluation
Dempster-Shafer method
Dempster-Shafer approach
Dempster-Shafer
Color
belief networks
Bayesian networks
Bayesian fusion approach
Bayesian
Bayes methods
biblio
Reliability analysis of power grids with cyber vulnerability in SCADA system
Submitted by BrandonB on Fri, 05/01/2015 - 7:26am
power grids
system breaker trip
system breaker
supervisory control and data acquisition system
Substations
SCADA systems
SCADA system
RTS79
remote access point
reliability test system 79
Reliability
power system security
power system reliability
Bayes methods
power grid reliability analysis
power engineering computing
loss of load probability
LOLP
Generators
forced outage rate
FOR model
cyber-physical power systems
cyber vulnerability
cyber security
critical data eavesdropping
Bayesian attack graph model
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods
« first
‹ previous
…
3
4
5
6
7
8
9
10
11