Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Games
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Games
universally composable security framework
universal composition operation
universal composability
Task Analysis
secure message communication
pubcrawl
proving simulation-based security
one-time-pad encryption
mechanized UC security analyses
Mechanization
ideally authenticated communication
ideal secure-communication functionality
ideal key-exchange functionality
hard computational problems
protocol verification
game-based security
formal verification
EASYCRYPT proof assistant
EasyCrypt
Diffie-Hellman protocol UC
Diffie-Hellman key-exchange
desired ideal functionality
Decisional Diffie-Hellman problem
Cryptography
Cryptographic Protocols
computer aided cryptography
composability
Complexity theory
complex protocols
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
Whats to Come is Still Unsure: Synthesizing Controllers Resilient to Delayed Interaction
Submitted by willirn1 on Wed, 08/21/2019 - 12:15pm
synthesizing controllers
resilience
delayed interaction
controller
Games
delays
game-graph
biblio
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
Submitted by grigby1 on Mon, 06/17/2019 - 11:51am
expert systems
privacy
decision patterns
Games
Human Factors
Metrics
pubcrawl
resilience
Scalability
security decisions
security requirements
Security Risk Management
biblio
SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber–Physical Systems
Submitted by willirn1 on Thu, 05/30/2019 - 4:01pm
cyber components
Transportation Networks
security and resilience
modeling and simulation
Cyber–physical systems (CPSs)
energy management
information and communication technology
Safety
cyber-physical systems
Games
Computational modeling
Transportation
secure cyber-physical systems
resilient cyber-physical systems
communication technologies
closed-loop systems
security of data
Cyberspace
physical means
security
system properties
control
learning
System Dynamics
smart transportation systems
attacker-defender games
denial-of-service attacks
SURE
information and communication technologies
modeling and simulation integration platform
resilience
Vanderbilt
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 4:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »