Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theory
biblio
If Air-Gap Attacks Encounter the Mimic Defense
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
resilience
mimic defense
Hard disks
Electromagnetic radiation
dynamic heterogeneous redundancy structure
dynamic heterogeneous redundancy
DHR structure
air-gap attacks
air-gap attackers
Air gaps
game theory
Transmitters
Atmospheric modeling
security
Metrics
malicious software
malware
composability
network attack
Intrusion Detection
computer network security
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
NFV
VNF executor
virtual network function
Service Chain
scalable end-to-end service chaining
NFV SFC
heterogeneous backup strategy
Heterogeneous
flexible end-to-end service chaining
data center environments
Backup
back-up procedures
intrusion tolerance
network function virtualization
Switches
security of data
computer centres
Virtualization
Games
Load modeling
game theory analysis
Reliability
composability
pubcrawl
Resiliency
game theory
Software
security
virtualisation
Cloud Computing
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 1:02pm
independent decision-making entities
Control Theory
unified team making team-based decisions
opposing subsystem
opposing attacked subsystem
noninferior Nash strategies
noncooperative game theory
Large-scale systems
interacting subsystems
security
decision-making process
cooperative game theory
complex systems
complex dynamical systems of systems
adversarial decision-making environment
game theory
Decision Making
pubcrawl
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
An Algorithmic Approach to Highly Resilient SATCOM
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
optimisation
time-varying systems
Throughput
theoretic game
satellite communication
SATCOM networks
resource optimization
Resiliency
resilience
predictive analysis
optimization
Bandwidth
pubcrawl
military communication
Jamming
highly resilient SATCOM
generic SATCOM control loop
generic multivector structure
Games
game theory
Control Theory and Resiliency
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »