Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
utility function
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 11:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods