Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Optimising Network Architectures for Provable Adversarial Robustness
Submitted by aekwall on Tue, 10/12/2021 - 2:13pm
Neural networks
Robustness
Computational modeling
Perturbation methods
Predictive models
Training
pubcrawl
Resiliency
Compositionality
artificial neural network
Predictive Metrics
provable security
computer vision
network architecture
biblio
A Multiple-Replica Provable Data Possession Algorithm Based on Branch Authentication Tree
Submitted by aekwall on Tue, 10/12/2021 - 2:13pm
security
authentication
Heuristic algorithms
Conferences
pubcrawl
Resiliency
Compositionality
Software algorithms
Predictive Metrics
data integrity
provable security
Multi Branch Authentication Tree
Multiple-Replica
provable data possession
software engineering
Vector Dot Product
biblio
Provably Robust Decisions based on Potentially Malicious Sources of Information
Submitted by aekwall on Tue, 10/12/2021 - 2:13pm
security
Robustness
Routing
pubcrawl
Resiliency
Decision Making
Compositionality
malware
Predictive Metrics
provable security
cognition
Information systems
malicious reporting
Provable robustness
trust-based security
biblio
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation
Submitted by aekwall on Tue, 10/12/2021 - 2:13pm
security
Measurement
Games
Wireless communication
pubcrawl
Resiliency
Industries
Reinforcement learning
Compositionality
Throughput
Predictive Metrics
provable security
Contextual Multi-Armed Bandit
link adaptation
RL algorithms security
security assessment
biblio
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting
Submitted by aekwall on Tue, 10/12/2021 - 2:12pm
authorization
Compositionality
Cryptographic Protocols
OAuth
Predictive Metrics
provable security
pubcrawl
Resiliency
security model
biblio
Cyber Security Situational Awareness Jointly Utilizing Ball K-Means and RBF Neural Networks
Submitted by aekwall on Thu, 09/30/2021 - 10:52am
Neural Network Security
Situation Awareness
security
Resiliency
RBF neural network
pubcrawl
Predictive models
Prediction algorithms
policy-based governance
Neural networks
situational awareness
Metrics
Data models
cyber-physical systems
Communication networks
Clustering algorithms
Ball k-means clustering
composability
Predictive Metrics
biblio
Advanced Wireless Control amp; Feedback Based Multi-functional Automatic Security System
Submitted by aekwall on Thu, 09/30/2021 - 10:46am
Fires
Networked Control Systems Security
Wireless network system
security system
Relays
Motion detector
mobile/computer
LDR
gas leakage
Gas detectors
security
Cayenne
Predictive Metrics
Industries
composability
Resiliency
pubcrawl
Software
sensors
biblio
Availability-Resilient Control of Uncertain Linear Stochastic Networked Control Systems
Submitted by aekwall on Thu, 09/30/2021 - 10:45am
Packet loss
pubcrawl
Resiliency
composability
Detectors
Predictive Metrics
actuators
Observers
Stochastic processes
Networked Control Systems Security
biblio
A Double-Layer Cyber Physical Cooperative Emergency Control Strategy Modification Method for Cyber-Attacks Against Power System
Submitted by aekwall on Thu, 09/30/2021 - 10:45am
pubcrawl
Resiliency
composability
Predictive Metrics
confusion matrix
Control Strategy
cyber physical power system
cyber-attacks
Networked Control Systems Security
biblio
Network congestion control and reliability optimization with multiple time delays from the perspective of information security
Submitted by aekwall on Thu, 09/30/2021 - 10:45am
linear matrix
Stability analysis
Resiliency
reliability problem
Reliability
pubcrawl
Predictive Metrics
Networked Control Systems Security
multi time delay complex system
Asymptotic stability
information security problem
information security
information blocking
delays
delay systems
Delay effects
composability
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »