Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
bayesian attack graphs
vulnerability exploitation
vulerability exploitation
NIST CVSS
NIST common vulnerability scoring system
network security assessment
Gold
CVSS metric version v2.0
CVSS metric version 3.0
CVSS metric version 1.0
CVSS
conditional probability computation method
Security Metrics
BAG
Computing Theory
Complexity theory
Metrics
conditional probability
Bayes methods
authentication
security of data
Measurement
pubcrawl
graph theory
biblio
Realistic measurement protection schemes against false data injection attacks on state estimators
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
maximum total ROI
FDIA
power system state estimation
Computing Theory
alternative measurement protection schemes
cost-benefit analysis
false data injection attacks
ignored cost-benefit issue
imminent cyber-physical security issue
state estimation
metric return
realistic measurement protection schemes
realistic MPS
return on investment
state estimators
Steiner tree problem
Steiner trees
Security Metrics
Metrics
Indexes
optimization
optimisation
power engineering computing
Smart Grids
power system security
trees (mathematics)
security of data
cyber-physical security
risk management
performance evaluation
pubcrawl
false data injection attack
graph theory
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
group differential privacy-preserving disclosure
εg-group differential privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
multilevel association graphs
information privacy protection
human factor
Human behavior
group privacy
aggregate information
graph theory
graph data
Electronic mail
drugs
Data protection
data privacy
data analysis
Computing Theory
Bipartite graph
Aggregates
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
A graph-based trust-enhanced recommender system for service selection in IOT
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
IoT
Trusted Computing
trust
Temperature measurement
Social network services
Social Internet of Things
service selection problem
security of data
reliable service
recommender systems
pubcrawl
collaboration
Internet of Things
Human Factors
Human behavior
graph-based trust-enhanced recommender system
graph theory
control systems
computer theory
collaborative filtering recommendation algorithm
collaborative filtering
biblio
Implicit Trust Relation Extraction Based on Hellinger Distance
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
social networking (online)
Measurement
optimization
probability statistics
pubcrawl
Recommended system
recommender systems
social network
Social network services
matrix factorization model
social recommendation
social trust relationship extraction
trust
trust measure methods
Trusted Computing
user similarity
user-item bipartite networks
Human behavior
clear trust data
computer theory
Data mining
explicit social trust information
explicit trust data
gaussian distribution
graph theory
hellinger distance
actual explicit user trust ratings
Human Factors
implicit social relation extractions
implicit social relationship
implicit social trust
implicit trust relation extraction
Matrix decomposition
matrix factorization
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »