Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decision-making process
biblio
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
security
resilience
Resiliency
robot cameras
Robot Operating System
robot operating systems
Robot vision systems
robust solutions
ROS
pubcrawl
security of data
self-driving cars industry
spatio-temporal autoencoders
suspicious frames
telecommunication security
Training
unsupervised anomaly detection tool
existing security breaches
camera frames
camera vulnerabilities
Cameras
car application
Decision Making
decision-making process
embedded cameras
environment discovery
Autonomous automobiles
Human behavior
Human Factors
Image reconstruction
important fields
Intrusion Detection
mobile robots
policy-based governance
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 1:02pm
independent decision-making entities
Control Theory
unified team making team-based decisions
opposing subsystem
opposing attacked subsystem
noninferior Nash strategies
noncooperative game theory
Large-scale systems
interacting subsystems
security
decision-making process
cooperative game theory
complex systems
complex dynamical systems of systems
adversarial decision-making environment
game theory
Decision Making
pubcrawl
biblio
Truth-Aware Optimal Decision-Making Framework with Driver Preferences for V2V Communications
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
Trusted Computing
pubcrawl
reported road events
resilience
Resiliency
Roads
Safety
Scalability
sensors
trust-aware decision-making framework
policy-based governance
truth-aware optimal decision-making framework
utility maximization framework
V2V communications
vehicle-to-vehicle communications
vehicles
vehicular ad hoc networks
vehicular traffic stream
verifiable transmitter
false data
appropriate human preference factors
Bayes rule
collaboration
data trustworthiness
Decision Making
decision-making process
Dempster Shafer Theory
event belief
Accidents
false information
false trust
incorporate driver preferences
Intelligent Transportation System
Intelligent Transportation Systems
malicious actors
multiple-vehicle attack
optimal action
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making