Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game model
biblio
An Approach on Attack Path Prediction Modeling Based on Game Theory
Submitted by aekwall on Mon, 12/20/2021 - 12:23pm
security
Organizations
Predictive models
Scalability
Analytical models
information technology
Games
pubcrawl
Metrics
Resiliency
Human behavior
game theory
advanced persistent threat
APT attack
game model
network defense framework
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
ubiquitous computing
Computing Theory and Privacy
user data privacy preservation
three-antithetic-party game
serious privacy issues
privacy-preserving data collection scheme
privacy leakage risk
data collection game
context-awareness
Context-aware services
context-aware applications
smart devices
game model
security of data
Numerical models
Games
Data collection
privacy
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters
Submitted by aekwall on Mon, 06/08/2020 - 11:26am
cybersecurity loss awareness
VM-to-VM cybersecurity interdependency risks
two-player zero-sum game
static VM allocation
resource utilization
public cloud clusters
operating expense
multidimensional bin packing approaches
mathematical programming approach
large-scale cloud data centers
game theoretic-based approaches
equilibrium allocation strategies
cybersecurity-aware virtual machine placement
cybersecurity-aware consolidation algorithms
security of data
mathematical programming
game theoretic security
game model
virtual machines
Predictive Metrics
Human Factors
resource allocation
Cybersecurity
pubcrawl
game theory
Scalability
Cloud Computing
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data