Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170107
biblio
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
non-monetary incentives
Statistics
Sociology
social networking (online)
social network sites
public good
pubcrawl170108
pubcrawl170107
privacy implications
privacy
population estimate
personal information
nonmonetary incentives
data analysis
Non-cooperative game
Noise
Nash Equilibrium
incentive schemes
Games
game theory
game theoretic study
estimation
digital repositories
data privacy
Data Analytics
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
The optimal contracts in continuous time under Knightian uncertainty
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
optimal control
Yttrium
uncertainty
TV
pubcrawl170108
pubcrawl170107
principal-agent problems
optimization
optimisation
optimal control theory
continuous time system
optimal contracts
optimal contract
Knightian uncertainty
g-expectation framework
financial management
differential equations
contracts
continuous time systems
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
An effective information filtering method based on the LTE network
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
information filtering method
Training
pubcrawl170108
pubcrawl170107
network security
nearest neighbor text classification
mobile computing
minimum-risk Bayesian classification
LTE network
LTE
Long Term Evolution
learning (artificial intelligence)
KNN (Key Nearest Neighbor)
information technology
Information filters
4G LTE high-speed network
information filtering
four-level content-based information filtering
five-tuple filter
filtering theory
filtering algorithms
data analysis
content-based information filtering
content-based filter
Classification algorithms
Bayesian classification
Bayes methods
AdaBoost
4G mobile communication
4G LTE network
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
global flow diagram
Virtual machining
unauthorized access risks
unauthorized access
security of data
pubcrawl170108
pubcrawl170107
multilevel hybrid cloud algorithm
legitimacy detection
graph theory
global flow graph
Access Control
Frequency modulation
formal representation
detection algorithms
detection algorithm
Decision Making
data access
Cloud Computing
Algorithm design and analysis
access violation
biblio
Privacy on hypothesis testing in smart grids
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
power system control
Yttrium
unauthorized binary hypothesis testing
testing
smart power grids
smart meters
smart meter
Smart Grids
pubcrawl170108
pubcrawl170107
privacy risk suppression
privacy information leakage
privacy
power system security
asymptotic exponential decay rate minimization
power control
optimal energy control strategy
optimal control
minimum type II error probability
error statistics
energy supply
energy storage device
Energy storage
energy source
energy provider
data privacy
consumer behaviour
biblio
Mapping of Dengue Outbreak Distribution Using Spatial Statistics and Geographical Information System
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
GIS
Urban areas
spatial statistics
Rivers
risk map
risk analysis
pubcrawl170108
pubcrawl170107
pattern classification
kernel density estimation
Kernel
KDE
Aedes mosquito-borne disease
geographical information system
geographic information systems
estimation theory
estimation
diseases
dengue fever outbreak distribution
data analysis
buffer analysis
average nearest neighbor
Artificial Neural Networks
ANN
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
Defending mechanisms for protecting power systems against intelligent attacks
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
defending mechanisms
game theory
Games
generalized game models
intelligent attacks
Load modeling
Nash Equilibrium
Numerical models
Power system protection
power system security
power systems
pubcrawl170107
pubcrawl170108
risk assessment
zero-sum game model
1
2
3
4
next ›
last »