Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mathematical programming
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters
Submitted by aekwall on Mon, 06/08/2020 - 11:26am
cybersecurity loss awareness
VM-to-VM cybersecurity interdependency risks
two-player zero-sum game
static VM allocation
resource utilization
public cloud clusters
operating expense
multidimensional bin packing approaches
mathematical programming approach
large-scale cloud data centers
game theoretic-based approaches
equilibrium allocation strategies
cybersecurity-aware virtual machine placement
cybersecurity-aware consolidation algorithms
security of data
mathematical programming
game theoretic security
game model
virtual machines
Predictive Metrics
Human Factors
resource allocation
Cybersecurity
pubcrawl
game theory
Scalability
Cloud Computing
biblio
ADMM-based Beamforming Optimization for Physical Layer Security in a Full-duplex Relay System
Submitted by aekwall on Mon, 02/17/2020 - 2:23pm
optimization problems
semidefinite relaxation approach
SDR approach
relay beamformer
mathematical programming
Lagrangian functions
full-duplex relay system
full-duplex communication systems
Convex functions
Channel estimation
augmented Lagrangian
alternating direction of multiplier method
ADMM-based beamforming optimization
telecommunication security
full-duplex
relay networks (telecommunication)
Relays
signal processing security
physical layer security
array signal processing
privacy
optimization
Metrics
composability
pubcrawl
Resiliency
biblio
Towards a theory of free-lunch privacy in cyber-physical systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Human behavior
Smart homes
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy
optimization
multiparametric programming
mathematical programming
human factor
computational geometry
Heating systems
free-lunch privacy mechanism
Decision Making
data-informed decision making processes
data utility
Data protection
data privacy protection
data privacy
cyber-physical systems
Computing Theory
biblio
A hybrid algorithm for reactive power optimization based on bi-level programming
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
power grids
voltage deviation
upper-level model
RFA
reactive power source
reactive power optimization
reactive power control
random forests algorithm
pubcrawl170110
primal-dual interior point algorithm
power system
active power source
minimisation
mathematical programming
interior point algorithm
grid voltage-reactive power control
grid loss minimization
discrete variables
by random forests algorithm
bi-level programming model
Bi-level programming