Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multi-agent systems
biblio
Reputation-Based Event-Triggered Formation Control and Leader Tracking with Resilience to Byzantine Adversaries
Submitted by grigby1 on Wed, 06/02/2021 - 11:32am
Control Theory
Detectors
Human behavior
Loss measurement
multi-agent systems
network topology
Nickel
pubcrawl
resilience
Resiliency
Scalability
biblio
Privacy Preserving Average Consensus by Adding Edge-based Perturbation Signals
Submitted by grigby1 on Wed, 06/02/2021 - 11:20am
Control Theory
convergence
Cryptography
Heuristic algorithms
Human behavior
multi-agent systems
Perturbation methods
privacy
pubcrawl
resilience
Resiliency
Scalability
Signal processing algorithms
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
Designing Context-Sensitive Norm Inverse Reinforcement Learning Framework for Norm-Compliant Autonomous Agents
Submitted by grigby1 on Mon, 03/29/2021 - 12:15pm
Human Factors
social norm-compliant behavior
Scalability
pubcrawl
privacy norm
privacy
norm-compliant autonomous agents
multi-agent systems
Markov processes
learning (artificial intelligence)
IRL framework
autonomous agents interact
human behaviors
expert systems
expert demonstrations
ethical social norms
data privacy
context-sensitive RL
context-sensitive norm IRL
context-sensitive norm inverse reinforcement learning framework
context spaces
CNIRL
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 12:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
IMPACT: A Trust Model for Human-Agent Teaming
Submitted by aekwall on Mon, 02/01/2021 - 10:39am
IMPACT model
Weapons
unmanned vehicle
trust
Task Analysis
target engagement
remotely operated vehicles
pubcrawl
Predictive models
multi-agent systems
large scale joint exercise controlling multiple unmanned vehicles
intelligent adaptive decision aid
Adaptation models
human-autonomy interaction
human-agent teaming
human trust
human partners
Human behavior
Decision Making
collaborative team
collaboration
autonomous agents
authorization
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »