Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security resources
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Scheduling of Security Resources in Software Defined Security Architecture
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
security data plane
software defined security architecture
Software Defined Security
software defined networking
security tasks
security task abstracting
security scheduling mechanism
security resources scheduling
security resources
security resource scheduling algorithm
security resource capability abstracting
security protection task
security protection efficiency
security devices
security demand
automated security business management
security control plane
scheduling
resource pool
Resiliency
resilience
pubcrawl
orchestration
open security devices
new-type open security devices
Network Security Architecture
network security
Knowledge Discovery
distributed computing
computer network security