Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
predictability
biblio
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
Mitch approach
web security
tools
Task Analysis
supervised learning techniques
supervised learning technique
sensitive HTTP requests
security of data
Security Heuristics
security
Scalability
Resiliency
pubcrawl
predictability
Black Box Security
Manuals
machine learning solution
machine learning approach
machine learning
learning (artificial intelligence)
internet
HTTP requests
Forgery
CSRF vulnerabilities
cross-site request forgery
Cross Site Request Forgery
Browsers
black-box detection
biblio
Heuristics-Based Multi-Agent Task Allocation for Resilient Operations
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
pre-requisite
Markovian assumptions
Markovian state information
modeling probabilistic failure
natural world
navigation
nonMarkovian setting
nonMarkovian state modeling
novel heuristic
intelligent task assignment
real-world systems
realistic state
rescue robots
resilient operations
SAR
uncertainty modeling
Security Heuristics
predictability
Probabilistic logic
Task Analysis
Resiliency
pubcrawl
resource management
multi-robot systems
multi-agent systems
robots
uncertainty
Scalability
Markov processes
Linear programming
agent failure
complex environments
heuristics-based multiagent task allocation
imulated search and rescue mission
inherent challenges
biblio
Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
individual security systems
utility-privacy tradeoff curve
two-layer single-leader multifollower game
specific security actions
sophisticated attack techniques
security of data
Security Heuristics
security entities
Scalability
Resiliency
pubcrawl
privacy-sensitive entities
privacy-aware collaborative security
privacy
predictability
optimal collaboration strategies
anticipated information exchange
Heuristic algorithms
Games
game-theoretic approach
game theory
Electronic mail
data privacy
Computing Theory
Computer crime
collaborative security schemes
collaborative security
collaborative entities
collaboration
Byzantine entities
attack prevention
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
SINR and Reliability Based Hidden Terminal Estimation for Next Generation Vehicular Networks
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
broadcast vehicular communication
hidden terminal problem
predictability
pubcrawl
Reliability
Resiliency
Scalability
Security Heuristics
sinr estimation
biblio
Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
Design Time
DSE
Hybrid Mapping
NoC
predictability
pubcrawl
Resiliency
Run Time
Scalability
security
Security Heuristics
side channel attack
biblio
Systematic Analysis of Qualitative Data in Security
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
grounded theory
predictability
pubcrawl
qualitative
Resiliency
Scalability
Security analysis
Security Heuristics
biblio
On Convergence of Conventional and Meta-heuristic Methods for Security-constrained OPF Analysis
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
conventional and meta-heuristic methods
particle swarm optimization
predictability
pubcrawl
Resiliency
Scalability
Security Heuristics
security-constrained optimal power flow
biblio
User Disbelief in Privacy Paradox: Heuristics That Determine Disclosure
Submitted by grigby1 on Fri, 11/03/2017 - 11:24am
cognitive heuristics
information disclosure
Internet security
predictability
privacy
privacy paradox
pubcrawl
Resiliency
Scalability
Security Heuristics
file
Machine Learning – Game Changer for CPS?
Submitted by Sandeep Neema on Mon, 05/16/2016 - 2:44pm
adaptability
ISIS- Vanderbilt University
machine-learning
predictability
2016
Academia
Presentation
Presentations
« first
‹ previous
1
2
3
4