Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theory
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
AI and Security: A Game Perspective
Submitted by grigby1 on Fri, 08/04/2023 - 10:15am
pubcrawl
Human behavior
Human Factors
Metrics
security
Safety
Scalability
Games
Robustness
data integrity
Shape
game theory
AI
Reinforcement learning
game theoretic security
Wildlife
biblio
CySec Game: A Framework and Tool for Cyber Risk Assessment and Security Investment Optimization in Critical Infrastructures
Submitted by grigby1 on Fri, 08/04/2023 - 10:15am
Smart Grids
remote monitoring
attack-defense tree
game theoretic security
game theory
software tools
risk assessment
Software algorithms
Games
critical infrastructure
Cybersecurity
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
CPS
risk management
biblio
Secure Wireless Sensor Network Energy Optimization Model with Game Theory and Deep Learning Algorithm
Submitted by grigby1 on Fri, 08/04/2023 - 10:15am
Games
Energy optimization
Adversarial network algorithm
game theoretic security
mathematical models
Energy Efficiency
Data Security
game theory
Cyberspace
deep learning
energy resources
wireless sensor networks
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing
Submitted by grigby1 on Mon, 07/10/2023 - 2:35pm
reliability theory
tampering detection
feature insertion
Resiliency
edge detection
edge computing security
game theory
Interference
object detection
Image edge detection
Adaptation models
Streaming media
composability
Scalability
resilience
Metrics
pubcrawl
security
feature extraction
biblio
Analysis of “Tripartite and Bilateral” Space Deterrence Based on Signaling Game
Submitted by grigby1 on Fri, 06/30/2023 - 1:32pm
Games
tying hands
tripartite and bilateral
sunk coat
space deterrence
signal game theory
Deterrence
mechatronics
game theory
pubcrawl
information technology
Scalability
Analytical models
Conferences
Resiliency
resilience
Human behavior
biblio
Green Resilience of Cyber-Physical Systems
Submitted by grigby1 on Fri, 06/09/2023 - 12:48pm
pubcrawl
resilience
Resiliency
Software
cyber-physical system
real-time systems
cyber-physical systems
uncertainty
CPS
software reliability
game theory
Green products
Green
air pollution
On-line Learning
biblio
Access Control Mechanism Based on Game Theory in the Internet of Things Environment
Submitted by grigby1 on Fri, 05/12/2023 - 9:16am
Games
Behavioral sciences
Resiliency
Control Theory
Regulators
trust value
Nash Equilibrium
game theory
Dynamic scheduling
Internet of Things
Access Control
Scalability
security
resilience
Human Factors
Human behavior
pubcrawl
biblio
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender’s Deception Architecture
Submitted by grigby1 on Fri, 04/28/2023 - 3:01pm
computer security
advanced persistent threats (apt)
Cyber-security
policy governance
Minimization
Resiliency
computer theory
game theory
Ransomware
Compositionality
computer architecture
composability
Cryptography
resilience
Metrics
Human behavior
pubcrawl
security
collaboration
biblio
A Game Theory based Attacker Defender Model for IDS in Cloud Security
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
game theory
Whales
simulation
security
Resiliency
resilience
pubcrawl
policy governance
optimization
Neural networks
Metrics
Human behavior
IDS
estimation
Deep Neural Network
deep learning
computer theory
Computational modeling
Compositionality
composability
collaboration
cloud computing security
Cloud Computing
CICIDS-2018 dataset
1
2
3
4
5
6
7
8
9
…
next ›
last »