Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
markov chain
biblio
Transient Security and Dependability Analysis of MEC Micro Datacenter under Attack
Submitted by grigby1 on Thu, 10/20/2022 - 2:37pm
simulation
Transient analysis
Stochastic Reward Nets
quantitative analysis
Multi-access Edge Computing
Resiliency
Stochastic Computing Security
markov chain
Random access memory
security
Numerical models
Resistance
Virtual machining
Scalability
resilience
pubcrawl
Servers
biblio
Compressive Sampling Stepped Frequency GPR Using Probabilistic Structured Sparsity Models
Submitted by grigby1 on Fri, 08/12/2022 - 8:59am
markov chain
stepped frequency radar
radar imaging
probabilistic model
Markov random field
Landmine detection
land mine detection
Ground penetrating radar
compressive sampling
pubcrawl
radar antennas
Image coding
Probabilistic logic
composability
estimation
Resiliency
resilience
biblio
Situational Control of a Computer Network Security System in Conditions of Cyber Attacks
Submitted by grigby1 on Wed, 03/02/2022 - 12:55pm
optimal control
situational control
security
Resiliency
resilience
real-time systems
pubcrawl
probability
Prediction algorithms
Aerospace electronics
Networked Control Systems Security
Metrics
markov chain
Cyber Attacks
control scenario forecast
computer network security system
computer networks
composability
biblio
Relationship Anonymity Evaluation Model Based on Markov Chain
Submitted by grigby1 on Wed, 02/09/2022 - 1:46pm
markov chain
anonymity
Anonymous assessment
attack model
Communication networks
composability
Computational modeling
Computers
Human behavior
Resiliency
Markov processes
Metrics
Probabilistic logic
Probability distribution
pubcrawl
Receivers
Relationship anonymity
resilience
biblio
A Stochastic Approach for an Enhanced Trust Management in a Decentralized Healthcare Environment
Submitted by grigby1 on Mon, 11/08/2021 - 12:45pm
Probabilistic logic
trusted platform modules
Trusted Platform Module
trust
Stochastic processes
smart contract
security
Resiliency
resilience
pubcrawl
Stochastic Computing Security
Permission
on-off attack
Medical services
markov chain
cyber physical systems
cyber physical security
composability
blockchain
authorization
biblio
Intrusion Detection System for the MIL-STD-1553 Communication Bus
Submitted by aekwall on Wed, 08/11/2021 - 1:29pm
timing
Intrusion Detection
authentication
Anomaly Detection
machine learning
machine learning algorithms
Vegetation
pubcrawl
Resiliency
composability
intrusion tolerance
communication bus security
markov chain
MIL-STD-1553
Military standards
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
biblio
Applications of Graph Integration to Function Comparison and Malware Classification
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
NET
pagerank
PageRank measure integration vectorization
PageRank vector
pattern classification
Perron vector
PMIV
privacy
probability
probability measure
Metrics
random forests
resilience
Resiliency
set theory
standalone classifier
text analysis
text-only feature space
vanilla random forest
vertex set
hand-engineered functions
abstract syntax tree
classification
code block
decompilation
directed graphs
easy-to-compute glass-box vectorization scheme
feature extraction
function comparison
graph integration
graph theory
.NET files
Human behavior
invasive software
Lebesgue antiderivatives
machine learning
malware
Malware Analysis
malware classification
markov chain
Markov processes
biblio
Compressive Sampling Stepped Frequency Ground Penetrating Radar Using Group Sparsity and Markov Chain Sparsity Model
Submitted by aekwall on Mon, 09/14/2020 - 11:30am
Ground penetrating radar
stepped frequency radar
sparse image
sparse delays
random frequencies
random antenna positions
radar resolution
radar imaging
radar data
radar antennas
Position measurement
Markov chain sparsity model
Markov Chain model
land mine detection
group sparsity
Group Sparse
Frequency measurement
compressive sampling stepped frequency ground penetrating radar
buried object detection
B-scan
Antenna measurements
A-scan
compressive sampling
markov chain
compressed sensing
Markov processes
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
1
2
3
next ›
last »