Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 10:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
optimization
TPA
third party auditors
secret key generation algorithms
Secret key
search problems
Resiliency
public key cryptography
pubcrawl
Predictive Metrics
auditing
encryption audits
encryption
decryption purpose
data integrity
cuckoo search algorithm
Cuckoo search
Compositionality
Cloud Computing
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
Integrity Auditing with Attribute based ECMRSA Algorithm for Cloud Data Outsourcing
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
Cloud Computing
Servers
abe
security
Protocols
Resiliency
pubcrawl
Cryptography
Databases
Predictive Metrics
Compositionality
data integrity
outsourcing
encryption audits
data sharing
data auditing
biblio
Transparent Provable Data Possession Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
encryption
user convenience
transparent provable Data Possession scheme
transparent PDP
third-party auditor
security of data
security
pubcrawl
provable data possession
Probabilistic logic
metadata
Mathematical model
general cloud storage system model
file organisation
encryption audits
provable security
discrete logarithm problem
data security techniques
data privacy
data integrity
conventional PDP
cloud storage
cloud proof
Cloud Computing
auditing
audit
Compositionality
Predictive Metrics
Resiliency
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »