Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Games
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
biblio
White-box traceable dynamic attribute based encryption
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
Silicon
white box cryptography
white-box traceable dynamic attribute based encryption
white-box traceability
user revocation
out-sourcing decryption
multiple users
decryption keys
CP-ABE scheme
ciphertext policy
access policy
malicious users
fine-grained access control
Cloud Computing
Secret key
pubcrawl
Games
Metrics
composability
Resiliency
private key cryptography
attribute-based encryption
encryption
authorisation
Servers
biblio
An Algorithmic Approach to Highly Resilient SATCOM
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
optimisation
time-varying systems
Throughput
theoretic game
satellite communication
SATCOM networks
resource optimization
Resiliency
resilience
predictive analysis
optimization
Bandwidth
pubcrawl
military communication
Jamming
highly resilient SATCOM
generic SATCOM control loop
generic multivector structure
Games
game theory
Control Theory and Resiliency
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
A Cyber-Nuclear Deterrence Game
Submitted by grigby1 on Fri, 07/03/2020 - 12:43pm
nuclear brinksmanship
strategic stability
standard game theoretic model
stabilizing destabilizing effects
Stability analysis
security of data
reliability theory
preemptive cyber attacks
opponent cyber capabilities
offensive cyber weaponry
Nuclear weapons
nuclear states
nuclear command
asymmetric cyber capabilities
information structure
incomplete information games
Games
game theory
Deterrence
cyberattack
cyber-nuclear deterrence game
cyber capabilities conflict
critical component
complete information game
Bayes methods
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »