Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation
biblio
Introspective Agents in Opinion Formation Modeling to Predict Social Market
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Agent Based Modeling (ABM)
Social Agents
social networks
social market
personal intentions
peer groups
opinion formation modeling
opinion formation model
Opinion Formation
model agents
introspective agents
internal tendency
governmental policies
Scalability
Numerical models
estimation
Human Factors
Predictive models
network theory (graphs)
social network
Production
multi-agent systems
social networking (online)
Peer-to-peer computing
pubcrawl
History
biblio
Attacks Due to False Data Injection in Smart Grids: Detection Protection
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
Meters
uncertainty
uncertainties
system reliability
system protection
smart power grids
Smart Grids
Smart Grid
Resiliency
resilience
pubcrawl
power system security
Power Grid
power generation reliability
power generation protection
Phasor measurement units
False Data Detection
Mathematical model
Human behavior
H2control
H2 control method
H2 control
feedback controller
feedback
FDI detection methods
false data injection attacks
False Data Injection
estimation
energy saving
cyber physical systems
composability
Attack detection
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric
biblio
Choice of Control Parameters of Complex System on the Basis of Estimates of the Risks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patents
Security Risk Estimation
security
search problems
Scalability
risk estimation
risk analysis
Resiliency
resilience
rational managing directors
Qualifications
pubcrawl
Personnel
asset management
minimization of risk
Metrics
Meteorology
Licenses
intangible assets
Human Factors
Human behavior
group of the operating factors
estimation
estimate of the risk of functioning
criteria factor
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
Security for Safety: A Path Toward Building Trusted Autonomous Vehicles
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
cyber-physical system
estimation
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Safety
Scalability
security
Security Risk Estimation
Self-Driving Car
Sensor attack
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 3:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Modeling of Information Processes for Modern Information System Security Assessment
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Information systems
security of information systems
security of data
Scalability
Resiliency
resilience
pubcrawl
Probability distribution
Probability density function
probability
policy-based governance
modeling conflict
Metrics
information theoretic security
automata
information system security assessment
information security
information influence modeling
hybrid automatons
Human Factors
Human behavior
estimation
conflict processes analysis
composability
collaboration
cellular automatons
automata theory
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »