Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognition
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Symbolic execution and probabilistic reasoning
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
Systematics
systematic program analysis technique
symbolic path conditions
software system security
software system safety
program paths
program behaviors
probabilistic reasoning
event occurrence probability
Computing Theory
cognition
Probabilistic logic
Security Metrics
reliability theory
Metrics
Atmospheric modeling
inference mechanisms
probability
Software systems
program diagnostics
Computational modeling
safety-critical software
Symbolic Execution
pubcrawl
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security breaches
US Health Insurance Portability and Accountability Act
US Department of Health and Human Services
taxonomy
software engineering
software development
social norms
SEMAVER
Semantics
semantic similarity metric
semantic similarity
semantic reasoning
security policies
security of data
accidental misuses
Security and privacy breaches
security
pubcrawl
Ontologies
norm violation
Medical services
Measurement
malicious misuses
inference mechanisms
HIPAA
HHS
cognition
breach ontology
biblio
Incremental knowledge acquisition and self-learning for autonomous video surveillance
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
unlabeled video streams
knowledge acquisition
object detection
pubcrawl
Resiliency
safety purpose
Scalability
self-learning
Self-Organizing Maps
standard machine learning pipelines
Intelligent Video Analysis
Unsupervised Learning
unsupervised machine learning
video feed
video frame
video signal processing
video stream
video streaming
video surveillance
video surveillance systems
Hazards
Anomaly Detection
autonomous video surveillance
benchmark video dataset
Change detection
Clustering algorithms
cognition
event detection
feature extraction
hazard detection
action recognition
Heuristic algorithms
Human behavior
imperative security
incremental knowledge acquisition
incremental learning
incremental machine learning
Industry 4.0
industry/smart factory settings
intelligent high-level video analysis
biblio
Zero-Day Attack Identification in Streaming Data Using Semantics and Spark
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
semantic reasoning
MRMR feature selection algorithm
parallel detection
pattern classification
pubcrawl
Resiliency
security of data
semantic learning
Semantic learning and reasoning
semantic link networks
minimum redundancy maximum relevance feature selection algorithm
Semantics
SLN
Spark Streaming
Spark streaming platform
Sparks
Training
Zero day attacks
zero-day attack identification
feature extraction
cognition
collaborative classification methods
Collaborative mining
composability
Computer hacking
Data Streaming
defense
dynamic semantic graph generation
Anomaly Detection
Feature Selection
Flow Creation
graph theory
groupware
IDS
Intrusion Detection Systems
learning (artificial intelligence)
Metrics
biblio
Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Mathematical model
zero-sum repeated game
Zero-Sum Games
security of data
security
Scalability
Resiliency
resilience
rational strategy
rational attacker
pubcrawl
optimal cyber-defense strategies
network security
network administrator
Metrics
advanced persistent threats
Human behavior
graph edges
Games
game theory
game theoretical analysis
expressive model
Exponential distribution
defense budget
Data models
cyber attackers
Cyber attack modeling
cognition
budget constrained network administrators
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
biblio
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Metrics
Trusted Computing
sos
security of data
Security Metrics
Science of Security
science of cyber security
Scalability
risk-based approach
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
policy-based sharing
Ontologies
Attack detection
Measurement
Human Factors
Human behavior
Forensics
data trustworthiness
data driven science
data driven approach
Context
computer security
composability
collaboration
cognition
attack mitigation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »