Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
A Secured OpenFlow-Based Software Defined Networking Using Dynamic Bayesian Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
Ryu controller
Transport Layer Security
stateful firewall
state information
secured OpenFlow-based software defined networking
programmable network protocol
main standard protocol
emulated network
dynamic bayesian network
distributed denial-of-service attack
denial-of-service attack
belief networks
Hidden Markov models
computer network security
Firewalls (computing)
Heuristic algorithms
OpenFlow
composability
pubcrawl
Resiliency
transport protocols
software defined networking
Bayes methods
Protocols
firewalls
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold
Submitted by grigby1 on Fri, 07/10/2020 - 11:40am
private data exposure
learning (artificial intelligence)
manifold
Manifolds
medical information systems
medical research
multigrid
multigrid solver method
privacy
privacy exposure risk
privacy legislation
information loss
Probabilistic logic
probability
pubcrawl
quasiidentifiers
Scalability
security of data
strong guarantees
thwarts de-anonymisation
treatment data
data anonymity
attribute combination
attribute pairs
attribute separation
Bayes methods
Bayesian networks
Bayesian networks optimised
belief networks
case agnostic method
Data Anonymisation
anonymisation algorithms
data deletion
Data models
data privacy
data transformation
Distributed databases
distributed high-dimensional data repositories
distributed high-dimensional health data silos
high conditional probability
identifying data exposure
biblio
A Cyber-Nuclear Deterrence Game
Submitted by grigby1 on Fri, 07/03/2020 - 12:43pm
nuclear brinksmanship
strategic stability
standard game theoretic model
stabilizing destabilizing effects
Stability analysis
security of data
reliability theory
preemptive cyber attacks
opponent cyber capabilities
offensive cyber weaponry
Nuclear weapons
nuclear states
nuclear command
asymmetric cyber capabilities
information structure
incomplete information games
Games
game theory
Deterrence
cyberattack
cyber-nuclear deterrence game
cyber capabilities conflict
critical component
complete information game
Bayes methods
biblio
Federated Learning with Bayesian Differential Privacy
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
image classification
sharper privacy loss
Servers
Scalability
Resiliency
pubcrawl
privacy budget
privacy accounting
privacy
machine learning
learning (artificial intelligence)
image classification tasks
Bayes methods
Human behavior
formal privacy guarantees
federated setting
federated learning
differential privacy
deep learning
data privacy
Computational modeling
composability
Bayesian privacy accounting method
Bayesian differential privacy
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
biblio
Chinese Texts Classification System
Submitted by aekwall on Mon, 05/18/2020 - 10:55am
text analysis
NB method
Naive Bayes
machine learning field
k-Bayes algorithm
hierarchy conception
deep learning field
based algorithms
automatic system
automatic Chinese text classification system
probability
convolution
natural language processing
CNN
Scalability
Training
pattern classification
neural nets
deep learning
pubcrawl
Human behavior
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
Classification algorithms
Bayes methods
biblio
Generalized Reconstruction-Based Contribution for Multiple Faults Diagnosis with Bayesian Decision
Submitted by aekwall on Mon, 05/18/2020 - 10:48am
belief networks
smearing effect
multiple faults diagnosis
multiple fault diagnosis
Multi-dimensional reconstruction based contribution
industrial process
generalized reconstruction-based contribution
data-driven fault diagnosis method
bayesian decision
process monitoring
fault detection
Covariance matrices
fault diagnosis
Monitoring
numerical simulation
numerical analysis
Human Factors
principal component analysis
Indexes
cyber physical systems
PCA
Metrics
pubcrawl
Resiliency
Bayes methods
biblio
Measuring the Effectiveness of Network Deception
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
Network reconnaissance
uncertainty
target network
software-defined networking
software defined networking
SDN-based deception system
Scalability
Resiliency
resilience
reconnaissance surface
Reconnaissance
pubcrawl
network-based deception
network traffic
Bayes methods
Network Deception
measurement uncertainty
KL-divergence
IP networks
inference mechanisms
Government
cyber reconnaissance
cyber defensive system
cyber deception strategies
computer network security
Computer crime
belief system
Bayesian inference method
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »