Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Nash Equilibrium
biblio
Cyber-Physical-Social Aware Privacy Preserving in Location-Based Service
Submitted by grigby1 on Wed, 04/20/2022 - 10:44am
authentication
CPS-aware privacy utility maximization
CPS Privacy
data privacy
Games
Human Factors
Location-based service
Nash Equilibrium
privacy
privacy leakage
pubcrawl
Servers
biblio
Trust-based Incentive for Mobile Offloaders in Opportunistic Networks
Submitted by grigby1 on Tue, 07/27/2021 - 12:06pm
Base stations
computer science
computer theory
Conferences
Data offloading
data traffic
Human behavior
incentive
Mobile handsets
Nash Equilibrium
Opportunistic Networks
pubcrawl
Relays
Target set selection
trust
Wireless fidelity
biblio
Trust Induced Resource Provisioning (TIRP) Mechanism in IoT
Submitted by aekwall on Tue, 06/01/2021 - 1:28pm
Nash Equilibrium
Time factors
Task Analysis
Signal processing algorithms
Scalar chain
resource provisioning
Resiliency
pubcrawl
performance evaluation
Computing Theory
Internet of Things
Human Factors
Gang Plank
Computing Theory and Trust
composability
Cloud Computing
trust
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 1:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
information and communication technology
trustworthiness
Trusted Computing
trust
sensors
security threats
security
secure operation
pubcrawl
Peer-to-peer computing
Nash Equilibrium
Mathematical model
game theoretic security
information and communication technologies
ICT
Games
game-theoretic approach
game theory
cyber-physical systems
CPS sensor nodes
composability
Predictive Metrics
Scalability
Human Factors
biblio
Toward Interactional Trust for Humans and Automation: Extending Interdependence
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
team working
Computer Theory and Trust
trustworthiness machines
trusted teammates
trust-related concepts
Social psychology
social exchange
outcome-based trust
interdependence theory
interactional trust
integrated interactional approach
human-automation trust
Human-automation interaction
automated future
security of data
human-robot interaction
Matrix decomposition
Nash Equilibrium
Compositionality
Human Factors
psychology
human computer interaction
automation
tools
composability
pubcrawl
Trusted Computing
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
« first
‹ previous
1
2
3
4
5
next ›
last »