Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
uncertainty
biblio
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Adversary Emulation
Adversary Models
cyber-physical security
cyber-physical systems
emulation
Human behavior
hybrid attack graph
Metrics
Numerical models
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
security
uncertainty
biblio
Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse?
Submitted by grigby1 on Tue, 12/01/2020 - 4:36pm
real-time systems
joint electricity procurement
Linear programming
Load management
market prices
Metrics
multiple geo
Policy Based Governance
price uncertainty
Pricing
Procurement
pubcrawl
joint bidding
realistic setting
resilience
Resiliency
resource allocation
Scalability
standards
strategic bidding
total electricity
uncertainty
wholesale markets
workloads
datacenters
bidding curve
Cloud Computing
cloud service provider
collaboration
composability
computer centres
convex programming
cost reduction
cost-saving performance
CSP
data centers
bandwidth cost
deregulated electricity market
Electricity supply industry
Geographic load balancing
geographical load balancing
GLB
Human behavior
Human Factors
IEEE transactions
Internet-scale Computing Security
Internet-scale service
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
A Trust Logic for Pre-Trust Computations
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
Human behavior
human trust
trust logic
subjective logic
social systems
pre-trust computations
logical language
JØsang Subjective Logic
formal languages
computational trust model
computational trust
security of data
formal logic
Semantics
Syntactics
Feeds
uncertainty
social networking (online)
Computational modeling
pubcrawl
Trusted Computing
security
biblio
Development of Quantitative Methods for Evaluating Intellectual Resources in the Digital Economy
Submitted by grigby1 on Mon, 11/02/2020 - 1:35pm
mathematical approach
valuation of intellectual resources
uncertainty
Technological innovation
Resiliency
resilience
quantitative methods
quantitative evaluation
pubcrawl
Production
policy-based governance
capitalization
intellectual resources
intellectual property valuation
intellectual property security
intellectual property
Industries
industrial property
Economics
digital economy
Cost accounting
composability
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 2:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »