Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Games
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
information and communication technology
trustworthiness
Trusted Computing
trust
sensors
security threats
security
secure operation
pubcrawl
Peer-to-peer computing
Nash Equilibrium
Mathematical model
game theoretic security
information and communication technologies
ICT
Games
game-theoretic approach
game theory
cyber-physical systems
CPS sensor nodes
composability
Predictive Metrics
Scalability
Human Factors
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
Resiliency
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Internet-scale applications
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
efficient bandwidth pricing algorithm
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
Bandwidth
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
biblio
Would You Trust a Robot Therapist? Validating the Equivalency of Trust in Human-Robot Healthcare Scenarios
Submitted by grigby1 on Tue, 12/01/2020 - 1:34pm
interactive systems
therapy intervention
robust trust
robots
robotic agent
robot therapist condition
Resiliency
resilience
pubcrawl
patient-agent relationship
patient treatment
Particle measurements
multi-agent systems
medical treatment
medical robotics
interpersonal interaction
Robot Trust
interactive robot agents
human-robot interaction
human-robot healthcare
human therapist condition
Human Factors
Human behavior
human agent
healthcare assistance
health care
Games
feedback
corrective feedback
Atmospheric measurements
Artificial Intelligence
biblio
The Impact of First Impressions on Human- Robot Trust During Problem-Solving Scenarios
Submitted by grigby1 on Tue, 12/01/2020 - 1:33pm
Primacy Effect
working robot
Task Analysis
robust trust
robotics
Resiliency
resilience
pubcrawl
problem-solving situation
problem-solving scenarios
Problem-solving
problem solving
Robot Trust
multi-robot systems
Medical services
Humanoid robots
humanoid robot
human-robot trust
human-robot interaction
Human Factors
human environments
Human behavior
Games
faulty robot behavior
biblio
“I Don't Believe You”: Investigating the Effects of Robot Trust Violation and Repair
Submitted by grigby1 on Tue, 12/01/2020 - 1:23pm
resilience
trust violation framing
trust repair strategy choice
Trust Repair
trust
Solar system
robust trust
robots
robot trust violation
Robot Trust
robot repair
Resiliency
Aerospace electronics
pubcrawl
maintenance engineering
human-to-robot promises
human-robot interaction
Human Factors
Human behavior
Games
game theory
finance
competitive game
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »