Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
conditional probability
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
bayesian attack graphs
vulnerability exploitation
vulerability exploitation
NIST CVSS
NIST common vulnerability scoring system
network security assessment
Gold
CVSS metric version v2.0
CVSS metric version 3.0
CVSS metric version 1.0
CVSS
conditional probability computation method
Security Metrics
BAG
Computing Theory
Complexity theory
Metrics
conditional probability
Bayes methods
authentication
security of data
Measurement
pubcrawl
graph theory
biblio
Reasoning Crypto Ransomware Infection Vectors with Bayesian Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Infection Vector
uncertainty
Resiliency
resilience
Ransomware
pubcrawl
Payloads
Nickel
Metrics
malware
invasive software
Bayes methods
encryption
Cryptography
crypto ransomware infection vectors
crypto ransomware
conditional probability
composability
belief networks
Bayesian network statistics
Bayesian network
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model