Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
biblio
Transparent Provable Data Possession Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
encryption
user convenience
transparent provable Data Possession scheme
transparent PDP
third-party auditor
security of data
security
pubcrawl
provable data possession
Probabilistic logic
metadata
Mathematical model
general cloud storage system model
file organisation
encryption audits
provable security
discrete logarithm problem
data security techniques
data privacy
data integrity
conventional PDP
cloud storage
cloud proof
Cloud Computing
auditing
audit
Compositionality
Predictive Metrics
Resiliency
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
Chinese Character Captcha Sequential Selection System Based on Convolutional Neural Network
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
feature extraction
word processing
word order restoration
word order recovery
Task Analysis
single Chinese character data
security of data
rotation transformation
recognition
pubcrawl
probability
Neural networks
natural language processing
image segmentation
Human behavior
handwritten character recognition
10-layer convolutional neural network
detection
convolutional neural networks
convolutional neural nets
composability
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CNN
Chinese character recognition sub-process
Chinese character detection
Chinese character captcha sequential selection system
Chinese character captcha recognition
Chinese character
character recognition
captchas
CAPTCHA
affine transformation
biblio
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
image segmentation
Web sites
Web Bots
web applications
user-friendliness
text-based CAPTCHA challenge
text analysis
segmentation technique
security of data
security mechanism
pubcrawl
optical character recognition
Multilingual CAPTCHA
internet
CAPTCHA string
Human Interaction Proof
human computer interaction
Human behavior
honeypot technique
honeypot
Hip
hidden text-boxes
deformations
Data protection
composability
captchas
CAPTCHA Usability
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »