Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bayes methods
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
An augmented cubature Kalman filter for nonlinear dynamical systems with random parameters
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
Mobile communication
time-of-arrival estimation
time difference of arrival
TDOA measurements
state vector
Resiliency
resilience
random sensor positions
random parameters
pubcrawl
Probability density function
Nonlinear dynamical systems
nominal values
Noise measurement
mobile source localization
augmented cubature Kalman filter
Metrics
Kalman filters
estimation accuracy
estimation
Dynamical Systems
discrete nonlinear dynamical systems
cubature point
Cubature Kalman filter
computational complexity
composability
CKF
Bayesian filtering problem
Bayes methods
augmented system
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
bayesian attack graphs
vulnerability exploitation
vulerability exploitation
NIST CVSS
NIST common vulnerability scoring system
network security assessment
Gold
CVSS metric version v2.0
CVSS metric version 3.0
CVSS metric version 1.0
CVSS
conditional probability computation method
Security Metrics
BAG
Computing Theory
Complexity theory
Metrics
conditional probability
Bayes methods
authentication
security of data
Measurement
pubcrawl
graph theory
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
biblio
A secure control plane for SDN based on Bayesian Stackelberg Games
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
pubcrawl
telecommunication control
software defined networking
Software Defined Network
self-cleaning mechanism
security reward
security
secure level
secure gain
secure control plane
SDN security
SDN
scheduling
Scalability
Resiliency
remote access detection
Bayes methods
Probes
network security
multiple controllers
heterogeneous controllers
Games
game theory
game strategy
forwarding lead
dynamic-scheduling method
Decentralized Control
controller architecture
controller
computer network security
closed-loop defense mechanism
Bayesian Stackelberg Games
biblio
On Sequential Selection of Attributes to Be Discretized for Authorship Attribution
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
Indexes
Training
stylometry
sequential selection
pubcrawl
pattern classification
naïve Bayes classifier
Naive Bayes
Metrics
merging
authorship attribution
Human behavior
forward sequential selection
Entropy
Electronic mail
discretization
data mining techniques
Data mining
computer science
Bayes methods
biblio
Adaptive Root Cause Analysis for Self-Healing in 5G Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
return on investment
network data
network experts
pattern classification
probabilistic Bayesian classifier
probability combinations
probable root cause
pubcrawl
quality of service
RCA process
resilience
Resiliency
Manuals
ROI
Root cause analysis
self-healing
self-healing networks
self-organising feature maps
self-organizing network
SH
SON based solutions
stratified synthesized data
telecommunication computing
Cellular networks
5G mobile communication
5G networks
adaptive learning
adaptive root cause analysis
adaptive systems
ARCA
automated evidence based RCA
automated fault detection
Bayes methods
Bayesian network theory
belief networks
5G
composability
domain knowledge reuse
fault detection
fault diagnosis
fault tolerant computing
Incomplete Data
learning (artificial intelligence)
Long Term Evolution
LTE Advanced
LTE-A
biblio
Reasoning Crypto Ransomware Infection Vectors with Bayesian Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Infection Vector
uncertainty
Resiliency
resilience
Ransomware
pubcrawl
Payloads
Nickel
Metrics
malware
invasive software
Bayes methods
encryption
Cryptography
crypto ransomware infection vectors
crypto ransomware
conditional probability
composability
belief networks
Bayesian network statistics
Bayesian network
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »