Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 2:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
Generation And Analysis Of Trust Networks
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
social network
wiki administrator network data sets
Trusted Computing
trust-based social graphs
trust networks
trust
triad
synthetic generation
standard generative modeling techniques
social networking (online)
social network data sets
clustering coefficient
social graph data sets
pubcrawl
original social graphs
original graphs
human social relationships
Human Factors
Human behavior
graph theory
Generative Models
Computing Theory
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
A Two-Stage Genetic Programming Hyper-Heuristic for Uncertain Capacitated Arc Routing Problem
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
poor routing policies
vehicle routing
UCARP
Two-Stage GPHH
two-stage genetic programming hyper-heuristic
TS-GPHH
Task Analysis
Statistics
Sociology
single-objective GPHH
search problems
routing policy
Routing
Robustness
pubcrawl
complex uncertain capacitated arc routing problem
optimization
MultiObjective GP
multi-objective.
MOGP
interpretable routing policies
human trust
Human behavior
graph theory
GPHH
GP-evolved routing policies
genetic algorithms
effective routing policies
Complexity theory
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
criticality metric
Resilient Security Architectures
secure cyber infrastructure
resilient cyber infrastructure
model attacker
metric measure
lateral propagation
information flow dependency
host criticality
graph spectral matrices
EDS cyber infrastructure
defense-in-depth architecture
Cyber Resiliency
security of data
Resiliency
Energy Delivery Systems
system design
Firewalls (computing)
resilience
Indexes
Measurement
Workstations
Mathematical model
graph theory
pubcrawl
Servers
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »