Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Code based community network for identifying low risk community
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
pubcrawl170107
vehicle routing
travelling
Time
security
Safety
safe routing
Routing
road traffic
road safety
road network
risk factor
pubcrawl170108
balancing conundrum
low risk community
low risk cities
Inference algorithms
fuzzy technique
fuzzy set theory
Fuzzy inference process
distance
cost
code based community network
Code based Community
Cities and towns
boulevard network centers
biblio
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
operating systems (computers)
Substations
smart power grids
Smart Grid
Security Risk Management
security
SCADA Security
risk management
pubcrawl170108
pubcrawl170107
power system management
power system control
power grids
power engineering computing
Communication equipment
off-the-shelf vulnerable operating systems
noncooperative game theory
Non-cooperative Game Theory
Nash Equilibrium
Mathematical model
interdependent ICT
Games
game-theoretical model
game theory
electrical infrastructures
cyber-physical system
communication infrastructure
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
biblio
A game-theoretic approach for minimizing security risks in the Internet-of-Things
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
optimal prosumer set
user data theft
two player game
Silicon
security risk minimization
security of data
security
pubcrawl170108
pubcrawl170107
prosumers selection Game
Cascading style sheets
noncooperative game
Nash prosumers selection
Nash Equilibrium
Internet of Things
Games
game theory
decision support
Conferences
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
Algorithmic information theory for obfuscation security
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Code Obfuscation
Complexity theory
encoding
Intellectual Property Protection
Kolmogorov Complexity
Measurement
pubcrawl170107
reverse engineering
security
Software
biblio
Response and reconfiguration of cyber-physical control systems: A survey
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Games
Sensor Systems
security of data
security mechanism
security
Reliability
Redundancy
pubcrawl170107
isolation mechanism
actuators
game theory
embedded systems
embedded computer
distributed embedded computing
detection mechanism
cyber-physical control system
attack protection
biblio
Designing virus-resistant networks: A game-formation approach
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
optimal network topology
worst-case Nash equilibrium
Viruses (medical)
virus-resistant network design
virus security
virus resiliency
telecommunication network topology
Stability analysis
security
pubcrawl170108
pubcrawl170107
price of anarchy
Peer-to-peer computing
autonomous system
network topology
Nash Equilibrium
Nash equilibria
internet
global optimum
Games
game-formation approach
game theory
decentralized fashion
computer viruses
computer network security
« first
‹ previous
…
405
406
407
408
409
410
411
412
413
…
next ›
last »