Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Theory
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security
biblio
A Game-Theoretic Approach and Evaluation of Adversarial Vehicular Platooning
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
security
Human behavior
Scalability
autonomous vehicles
resilience
Resiliency
Human Factors
Control Theory
cyber-physical systems security
biblio
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
security
Access Control
Human behavior
Scalability
resilience
attribute based encryption
Resiliency
Human Factors
Control Theory
personal health records
biblio
Automated Control of Multiple Software Goals Using Multiple Actuators
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
Adaptive software
Control Theory
dynamic systems
Human behavior
Human Factors
Non-Functional Requirements
resilience
Resiliency
Scalability
security
biblio
Dynamic Game Based Security Framework in SDN-enabled Cloud Networking Environments
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
security
game theory
Human behavior
Scalability
resilience
Resiliency
Human Factors
Control Theory
cloud systems
Distributed Denial of Service (DDoS)
moving target defense (MTD)
software defined networking (SDN)
biblio
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
Cloud Computing
computation verification
Control Theory
game theory
Human behavior
Human Factors
resilience
Resiliency
result integrity
Scalability
security
biblio
Market-based Security for Distributed Applications
Submitted by grigby1 on Wed, 09/05/2018 - 9:51am
security
software security
game theory
Human behavior
Scalability
resilience
Resiliency
Human Factors
Control Theory
financial derivatives
smart contracts
biblio
Power-Electronics-Enabled Autonomous Power Systems
Submitted by grigby1 on Wed, 09/05/2018 - 9:47am
Smart Grid
power system resiliency
power system scalability
power system security
power system stability
pubcrawl
resilience
Resiliency
Scalability
power system reliability
smart power grids
solar cell arrays
solar panels
Special issues and sections
Stability analysis
Voltage control
wind turbines
Human behavior
Control Theory
distributed energy resources
distributed generation
distributed power generation
Electric Vehicles
energy management
energy storage systems
Frequency synchronization
control systems
Inverters
power electronic converters
power electronics-enabled autonomous system
power generation control
power generation reliability
power system control
Power system dynamics
biblio
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
exponentiation
Control Theory
Cryptography
discrete logarithms
group theory
Human behavior
human factor
modular exponentiations
privacy
pubcrawl
resilience
Resiliency
Scalability
secure delegation
secure outsourcing
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »