Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decision making process
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Game theoretic framework for cyber-physical system security incorporating bounded rationality
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
limited computational capacity
theoretically expected outcome
security of data
security
Scalability
rational game playing
rational decision making
pursuit maximum payoff
pubcrawl
Predictive Metrics
Nash Equilibrium
minimax techniques
minimax Nash Equilibrium strategy
behavioural analysis
Industries
Human Factors
Games
game theory
game theoretic security
game theoretic attack-defence decision
defender
decision making process
Decision Making
cyber-physical systems
cyber-physical system security
Bounded Rationality
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 2:21pm
security of data
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
Monitoring
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
embedded security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
artificial intelligence security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
biblio
Are Cyber Attackers Thinking Fast and Slow? Exploratory Analysis Reveals Evidence of Decision-Making Biases in Red Teamers
Submitted by willirn1 on Fri, 09/20/2019 - 3:48pm
Cognitive Security
Cognitive Security in Cyber
cyber attackers
red teamers
decision making process
biblio
Automated and Agile Server ParameterTuning by Coordinated Learning and Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
Servers
neurocontrollers
Neurons
online learning
parameter tuning direction
predefined adjustment value
quantitative control output
reinforcement learning based server parameter tuning approach
self-adaptiveness
self-adjusting systems
Neural networks
system throughput
telecommunication computing
Throughput
Time factors
trial-and-error
virtualisation
virtualized data center hosting RUBiS
virtualized server infrastructure
WikiBench benchmark application
fault tolerant computing
agile server parameter tuning
automated server parameter tuning
average response time
bursty workloads
cloud environments
control engineering computing
coordinated learning and control
decision making process
effective throughput
agile parameter tuning
fuzzy control
internet
learning (artificial intelligence)
model independence
multitier applications
multitier Internet applications
multitier service architecture
neural fuzzy control