Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Detection of Integrity Attacks to Smart Grids Using Process Mining and Time-Evolving Graphs
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
integrity attack
attack graphs
work-in-progress approach
time-evolving graphs
time evolving graphs
smart power grids
smart meters
Smart Grids
process mining
Meters
Ireland Commission for Energy Regulation
integrity attacks
resilience
Frequency measurement
power system security
power engineering computing
Data mining
Anomaly Detection
graph theory
composability
Resiliency
Metrics
pubcrawl
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security
biblio
An Efficient Algorithm for Minimal Edit Cost of Graph Degree Anonymity
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
online social networks
Switches
social networks
social networking (online)
Social network services
social network graphs
social network data
Resiliency
resilience
pubcrawl
privacy
personal privacy
optimization
anonymity
Metrics
Human Factors
Human behavior
Heuristic algorithms
graph theory
graph k-degree anonymity
dynamic programming
delete edges
degree anonymity
data privacy
composability
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
The Information Security System Synthesis Using the Graphs Theory
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Russian Federation leISSlation
information security threats
optimal enterprise information protection system
optimality problem solution
optimality problem solution on the graph theory basis
protection vector isolation
pubcrawl
ranked descending graph construction
resilience
Resiliency
information security system synthesis based on graph theory
Scalability
security
security of data
Software
software complex basis
software information security
software restriction
tools
graph critical path
access subjects authentication
access subjects identification
computer storage media protection
enterprise information security
enterprise information security system
expert systems
FSTEC order No31
graph calculation
access delineation
graphs theory
graph theory
Hardware
hardware complex basis
hardware information security
Human behavior
information security
information security system synthesis
biblio
Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
original graph
uncertain graphs
uncertain graph
uncertain form
social-network data publishing
social-network data
social networking (online)
Social network services
Sensitivity
Scalability
Resiliency
pubcrawl
probability
privacy preserving
privacy
Perturbation methods
adversary knowledge
obfuscation algorithm
Human behavior
graph theory
general model
friendly-correlation preservation
differential privacy
data utility
data privacy
Correlation
composability
background knowledge attack
associated probability
algorithm privacy
Algorithm design and analysis
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »