Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theoretic security
biblio
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theory-based incentive mechanism
data plane
programmable network
Load management
software defined networking (SDN)
communication requirements
controller consortium blockchain
controller load balancing
cryptographic currency balance coin
game theoretic security
game-theoretic consensus
incentive controllers
incentive safe load balancing
load balance
multicontrollers
Pricing
proof-of-balance
secure load
resource allocation
Scalability
Cryptography
game theory
computer architecture
software defined networking
Resiliency
pubcrawl
blockchain
computer network security
Distributed databases
quality of service
Security analysis
Games
Human Factors
Predictive Metrics
SDN architecture
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
information and communication technology
trustworthiness
Trusted Computing
trust
sensors
security threats
security
secure operation
pubcrawl
Peer-to-peer computing
Nash Equilibrium
Mathematical model
game theoretic security
information and communication technologies
ICT
Games
game-theoretic approach
game theory
cyber-physical systems
CPS sensor nodes
composability
Predictive Metrics
Scalability
Human Factors
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters
Submitted by aekwall on Mon, 06/08/2020 - 11:26am
cybersecurity loss awareness
VM-to-VM cybersecurity interdependency risks
two-player zero-sum game
static VM allocation
resource utilization
public cloud clusters
operating expense
multidimensional bin packing approaches
mathematical programming approach
large-scale cloud data centers
game theoretic-based approaches
equilibrium allocation strategies
cybersecurity-aware virtual machine placement
cybersecurity-aware consolidation algorithms
security of data
mathematical programming
game theoretic security
game model
virtual machines
Predictive Metrics
Human Factors
resource allocation
Cybersecurity
pubcrawl
game theory
Scalability
Cloud Computing
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Infrastructure security
star topology
simultaneous game
Servers
security of data
security
Scalability
resource allocation
pubcrawl
Predictive Metrics
optical switches
Numerical models
Nash Equilibrium
interdependency levels
Interdependencies
Integrated optics
Attack Strategies
infrastructure resilience
infrastructure design
Human Factors
Games
game-theoretic defense strategy
game theory
game theoretic security
external attacks
defense effort
cyber-physical infrastructures
Cost accounting
constituent systems
bus structure
basic topological structures
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »