Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic programming
biblio
Survey on Defense Technology of Web Application Based on Interpretive Dynamic Programming Languages
Submitted by grigby1 on Tue, 07/11/2023 - 2:16pm
Information age
Web application
uncertainty
system defense
Resiliency
resilience
pubcrawl
Metrics
interpretive dynamic programming languages
internet
dynamic networks
Endogenous security
Dynamical Systems
dynamic programming
Cyberspace
cyber security
computer security
composability
security
biblio
Differentially Private String Sanitization for Frequency-Based Mining Tasks
Submitted by grigby1 on Tue, 04/12/2022 - 12:18pm
composability
string algorithms
frequent pattern mining
dynamic programming
Data Sanitization
genomics
Natural languages
differential privacy
Compositionality
pubcrawl
privacy
Data models
Heuristic algorithms
Conferences
Resiliency
resilience
Human behavior
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
Privacy-Preserving Policy Synthesis in Markov Decision Processes
Submitted by grigby1 on Wed, 06/02/2021 - 12:18pm
Privacy Policies
Computing Theory
Computing Theory and Privacy
Control Theory
differential privacy
dynamic programming
Heuristic algorithms
History
Human behavior
Markov processes
privacy
Probabilistic logic
pubcrawl
resilience
Resiliency
Scalability
biblio
Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test
Submitted by aekwall on Tue, 05/18/2021 - 3:19pm
Internet of Things
programming
Runtime
Buffer overflows
Resiliency
Human behavior
pubcrawl
Metrics
Software systems
vulnerability detection
dynamic programming
Compositionality
dynamic detection
Information filters
boundary test
buffer overflow
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
Internet of Things
text-based methods
text analysis
static characteristic extraction method
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malicious code
IoT malware detection
IoT
invasive software
C500-CFG
Human behavior
high-complexity programs
graph theory
feature information
feature extraction
dynamic programming
Ding's NP-hard problem
decom-piled executable codes
control flow-based features
control flow graph
computer network security
computational complexity
C500-CFG algorithm
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Optimal Privacy-Enhancing And Cost-Efficient Energy Management Strategies For Smart Grid Consumers
Submitted by aekwall on Mon, 06/24/2019 - 3:05pm
pubcrawl
Metrics
optimal energy management strategies
optimal privacy-enhancement
optimal solution
policy-based governance
privacy
Privacy Risk
privacy-cost trade-off
privacy-enhancement
Markov processes
Resiliency
signal processing
Smart Grid Consumeer Privacy
smart grid consumer privacy
smart grid consumers
Smart metering system
smart power grids
standards
unauthorized testing
energy cost
Bellman dynamic programming
Conferences
consumer behavior
consumer privacy
cost-efficient energy management strategies
data privacy
decision theory
design problem
dynamic programming
belief state Markov decision process problem
energy management
energy management systems
Energy storage
Human behavior
kullback-leibler divergence
Kullback-Leibler divergence rate
Markov Decision Process
Markov decision process framework
biblio
Dynamic programming for solving unit commitment and security problems in microgrid systems
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
renewable energy
Microgrids
power generation dispatch
power generation economics
power generation planning
power generation scheduling
power system security
pubcrawl
Reliability
microgrid systems
Resiliency
security
security problem
Smart Grid
Smart Grids
UC problem
unit commitment
unit commitment problem
energy management systems
composability
distributed generation
distributed power generation
DP
dynamic programming
dynamic programming algorithm
Dynamical Systems
electrical energy
batteries
generation system
Heuristic algorithms
MATLAB software
MCEMS
Metrics
microgrid
microgrid central energy management system
biblio
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
IMCGS
security
search problems
Resiliency
resilience
pubcrawl
path loss
optimal attack path analysis
Optimal attack path
network security
Monte Carlo methods
Metrics
k-zero attack graph
improved Monte Carlo graph search algorithm
Improved Monte Carlo Graph Search
ACO
Heuristic algorithms
graph theory
Games
dynamic programming
CVSS value
computer network security
composability
Backpropagation
attack graphs
attack graph
Artificial Neural Networks
ant colony optimization algorithm
ant colony optimisation
1
2
next ›
last »