Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
belief networks
biblio
Sybil Detection as Graph Filtering
Submitted by aekwall on Tue, 04/27/2021 - 1:12pm
security
Kernel
cyber-physical systems
Resiliency
pubcrawl
signal processing
social networking (online)
Laplace equations
Symmetric matrices
Eigenvalues and eigenfunctions
belief networks
biblio
Frequency Security Assessment for Receiving-end System Based on Deep Learning Method
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
Conferences
cyber-physical systems
Resiliency
pubcrawl
Deep Belief Network
belief networks
Asia
frequency security assessment
HVDC blocking
industrial power systems
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
Decision Support for Mission-Centric Network Security Management
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
cyber-physical systems
Resiliency
pubcrawl
Bayesian network
belief networks
attack graph
cyber situational awareness
decision support
Mission resilience
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Biological neural networks
Spiking Neural Networks
SNN
adversarial examples
belief networks
Deep Neural Network
Perturbation methods
DNN
Vulnerability
attack
image recognition
security
resilience
Neural networks
Training
Neurons
Robustness
machine learning
pubcrawl
Resiliency
cyber-physical systems
biblio
Test Method for Automatic Detection Capability of Civil Aviation Security Equipment Using Bayesian Estimation
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Safety
false alarm rate
security
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
detection rate
information technology
Markov processes
estimation
Monte Carlo methods
belief networks
Bayesian estimation
civil aviation security equipment
prohibited items
biblio
A Security Situation Prediction Method Based on Improved Deep Belief Network
Submitted by aekwall on Tue, 04/27/2021 - 1:09pm
security
cyber-physical systems
Resiliency
pubcrawl
Sociology
Statistics
Prediction algorithms
Clustering algorithms
Communication networks
Predictive models
Deep Belief Network
belief networks
Active Defense
electricity information network
security situation prediction
biblio
Time-series Network Anomaly Detection Based on Behaviour Characteristics
Submitted by aekwall on Tue, 04/27/2021 - 1:09pm
Anomaly Detection
time-series
preprocessing
bidirectional gated recurrent unit
abnormal network behaviors detection
belief networks
Deep Belief Network
timing
Logic gates
security
Correlation
Training
component
pubcrawl
Resiliency
cyber-physical systems
Adaptation models
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
IDS
telecommunication control
security
Scalability
resilience
pubcrawl
Packet loss
one-shot game
networked control systems
networked control system security
NCS
Monitoring
intrusion detection system
Industrial Control Systems
incomplete information based on game theory
Incomplete information
Networked Control Systems Security
Games
game theory
energy consumption
DoS attacks
Denial of Service attacks
cyber-physical systems
Control Theory
computer network security
belief networks
Bayes rule
Bayes methods
Predictive Metrics
composability
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »