Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
uncertainty
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
biblio
Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
information system security protection capability
uncertainty
specification description
Security Policies Analysis
security of data
security
requirement analysis
pubcrawl
protective equipment
protection policy
policy-based governance
Information systems
information system structure model
Analytical models
Granular Computing theory
granular computing
Formal Specification
exploratory evaluation requirements
exploratory evaluation process
exploratory evaluation description problem
exploratory evaluation
descriptive specification
description specification
Computational modeling
collaboration
Business
biblio
Covert Communication in Fading Channels under Channel Uncertainty
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Compositionality
covert channels
Detectors
fading channels
pubcrawl
Radiometry
Receivers
Resiliency
Scalability
uncertainty
Wireless communication
biblio
Misplaced Trust: A Bias in Human-Machine Trust Attribution – In Contradiction to Learning Theory
Submitted by grigby1 on Tue, 05/16/2017 - 12:32pm
Decision Making
HCI
Human behavior
human trust
learning
pubcrawl
trust
uncertainty
biblio
Robust-to-dynamics linear programming
Submitted by grigby1 on Wed, 03/08/2017 - 1:55pm
pubcrawl170110
upper bounds
uncertainty
structural properties
semidefinite programming based algorithm
semidefinite programming
Robustness
robust-to-dynamics optimization
robust-to-dynamics linear programming
robust optimization problems
Robust optimization
RDO
Asymptotic stability
polynomial time
optimization
Nonlinear dynamical systems
mathematical program
linear system
Linear programming
linear dynamics
Heuristic algorithms
Facsimile
Dynamical Systems
dynamical system
biblio
Query of Uncertain QoS of Web Service
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
Computers
continuous probability distribution
internet
optimization approaches
Probability distribution
pubcrawl170110
Q measurement
QoS
quality of service
query processing
Semantics
uncertain QoS query
uncertainty
Web Service
web services
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
requirements engineering
uncertainty
software engineering
security threat
security risk
security of data
security decision-making
security
risk management
risk assessment
Risk
Companies
quantitative decision analysis
pubcrawl170109
modelling language
identity theft
decision-making
Decision Making
crime script
crime science
Credit cards
biblio
The optimal contracts in continuous time under Knightian uncertainty
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
optimal control
Yttrium
uncertainty
TV
pubcrawl170108
pubcrawl170107
principal-agent problems
optimization
optimisation
optimal control theory
continuous time system
optimal contracts
optimal contract
Knightian uncertainty
g-expectation framework
financial management
differential equations
contracts
continuous time systems
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »