Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trees (mathematics)
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
A Stochastic Assessment of Attacks based on Continuous-Time Markov Chains
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
probability
trees (mathematics)
Transient analysis
Time measurement
stochastic propagation times
Stochastic processes
stochastic methodology
stochastic assessment
Statistical performance evaluation
sequential attack
security of data
Scalability
Resiliency
resilience
pubcrawl
attack propagation
Petri nets
performance evaluation
Markov processes
individual attack occurrence probabilities
cyber-physical systems
Cyber-physical attack
critical infrastructures
critical infrastructure
continuous-time Markov chains
Conferences
concurrent attack
Chained Attacks
basic attack tree
attack trees
biblio
Fast Scalable Approximate Nearest Neighbor Search for High-dimensional Data
Submitted by aekwall on Mon, 02/22/2021 - 1:45pm
load balancing
Load management
high-dimensional data
graph-based sequential approximate k-NN search algorithm
hierarchical navigable small world
HNSW
k-d tree-based solution
k-nearest neighbor search
K-NN search
nearest neighbor search
MPI one-sided communication
MPI-OpenMP solution
Nearest neighbor methods
parallel algorithms
similarity search
Vantage Point Tree
vantage point trees
Measurement
learning (artificial intelligence)
machine learning
pubcrawl
graph theory
Big Data
query processing
trees (mathematics)
Data mining
machine learning algorithms
application program interfaces
Predictive Metrics
Partitioning algorithms
approximation theory
Approximation algorithms
message passing
search problems
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
computer science
Tree network topologies
Randomized LFU
Internet requirements
ICN primary features
content replacement scheme
computer network
caching strategy
caching algorithms
Cache Replacement Strategy
Abilene network topologies
named data network
in-network caching
Time complexity
cache storage
information-centric networking
Scalability
named data networking
network performance
telecommunication network topology
delays
network traffic
trees (mathematics)
internet
convergence
Computational modeling
simulation
pubcrawl
Human behavior
Resiliency
telecommunication traffic
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
1
2
3
4
5
6
next ›
last »