Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious data
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 4:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms