Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decision theory
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
biblio
Robust optimization of risk for power system based on information gap decision theory
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
power system security
uncertainty
Robustness
robust optimization operation method
robust optimization of power system
risk optimization
risk management
risk control optimization
pubcrawl170108
pubcrawl170107
power systems
Decision support systems
power system risk control
power system management
Power industry
optimization
optimisation
nonprobabilistic uncertainties
Non-probabilistic uncertainty
information gap decision theory
IEEE-30 system
decision theory
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Analytical Network Process based model to estimate the quality of software components
Submitted by BrandonB on Mon, 05/04/2015 - 1:36pm
object-oriented programming
usability
Stability analysis
software units
software reliability
software quality numeric value estimation
software quality
software component quality estimation
Software component
quality
prioritization and software application
analytic hierarchy process
Measurement
interoperability
final software application system
dependency networks
decision theory
decision problem
decision parameter attribution
ANP based model
ANP
analytical network process based model
« first
‹ previous
1
2