Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAM/DRAM Memory
Submitted by BrandonB on Wed, 05/06/2015 - 12:01pm
Maximum matching
Throughput
system-on-chip
SRAM chips
random bipartite graph
Random access memory
performance evaluation
network devices
multiple-choice hash tables
memory speed difference
Memory management
average lookup time
Internet backbone traces
internet
hash table throughput maximization
graph theory
fixed left-side vertex degree
DRAM chips
data structures
combined SRAM/DRAM memory model
combined SRAM-DRAM memory
Bipartite graph
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 12:40pm
risk management
power grids
Power measurement
power network configuration
power operators
power system control
power system security
power-grid control networks
power-grid Infrastructures
power engineering computing
security
security assessment techniques
security-oriented stochastic risk management technique
situational awareness
Smart Grids
stochastic Bayesian network models
Stochastic processes
Bayes methods
operating system assets
numerical indices
Intrusion Detection Systems
interprocess communications
Indexes
graph-theoretic power system indexing algorithm
graph theory
Generators
cyber-side instrumentation probes
cyber-physical vulnerability assessment
cyber-physical systems
Cyber-physical security metrics
cyber-physical security indices
cyber-physical critical infrastructures
CPIndex
biblio
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
attack graph analysis
attack graphs
attack surface
authentication
graph theory
information security
Measurement
security frameworks
security of data
Servers
Software
Vectors
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 11:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 9:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics
biblio
Integrity Assessment Scheme for Situational Awareness in Utility Automation Systems
Submitted by BrandonB on Fri, 05/01/2015 - 7:41am
graph theory
utility automation systems
Unsupervised Learning
Switches
state estimation
situational awareness
power systems
power distribution control
partial internal failure
multiagent technology
Monitoring
interconnected devices
integrity assessment scheme
IEEE 34-bus test distribution system
human operators
graph-theoretic fuzzy cognitive maps
advanced automation systems
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
FCM
external damage
expert systems
event analysis
distributed intelligence
cognitive systems
Capacitors
automation system vulnerabilities
automation system
automation framework
automation
Artificial Intelligence
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
« first
‹ previous
…
19
20
21
22
23
24
25
26
27