Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Games
biblio
Random verifiable multi-server searchable encryption scheme
Submitted by grigby1 on Fri, 04/01/2022 - 1:08pm
Cloud Computing
composability
Data models
data privacy
Distributed databases
encryption
game theory
Games
multi-server
pubcrawl
resilience
Resiliency
result verification
search problems
searchable encryption
secret sharing
biblio
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
Submitted by grigby1 on Mon, 03/14/2022 - 12:38pm
Compositionality
Damage Assessment
Games
Human behavior
integrated circuits
Monte Carlo methods
pubcrawl
resilience
Resiliency
SCADA systems
SCADA Systems Security
Scalability
Sensor Systems
sensors
Social Agents
tools
biblio
MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
Trojaning attack
Edged-AI
moving target defense
Image edge detection
Deep Neural Network
simulation
Games
Scalability
Hardware
Conferences
Resiliency
resilience
Metrics
pubcrawl
Training
deep learning
biblio
System Component-Level Self-Adaptations for Security via Bayesian Games
Submitted by aekwall on Fri, 02/04/2022 - 10:34am
Computing Theory
resilience
Bayes methods
Bayesian game
composability
Computational modeling
Games
Metrics
object oriented security
pubcrawl
Resiliency
security
Self-Adaptation
software engineering
system analysis and design
Systems architecture
biblio
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
differential privacy
Adversary Models
Upper bound
Toxicology
Membership-Inference
machine-learning
DP-SGD
Differentially-private-(DP)-machine-learning
Differentially-private
Deep-learning
privacy
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Games
Training
deep learning
biblio
Adversarial Deep Learning Models With Multiple Adversaries
Submitted by aekwall on Mon, 12/20/2021 - 12:29pm
Computational modeling
deep learning
Games
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
Semantics
game theory
supervised learning
Stochastic processes
Skeleton
adversarial learning
Adversarial Machine Learning
Adversary Models
biblio
An Approach on Attack Path Prediction Modeling Based on Game Theory
Submitted by aekwall on Mon, 12/20/2021 - 12:23pm
security
Organizations
Predictive models
Scalability
Analytical models
information technology
Games
pubcrawl
Metrics
Resiliency
Human behavior
game theory
advanced persistent threat
APT attack
game model
network defense framework
biblio
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
game theory
simulation
resource management
Resiliency
pubcrawl
Organizations
Metrics
Human behavior
genetic algorithm
Games
game theoretic security
Deception Technology
Data Breach
Conferences
Computational modeling
advanced persistent threat
Scalability
Predictive Metrics
Human Factors
biblio
Mining Pool Selection Problem in the Presence of Block Withholding Attack
Submitted by grigby1 on Mon, 11/29/2021 - 2:51pm
blockchain
block withholding attack
Evolutionary Game Theory
Games
Human behavior
Human Factors
Metrics
Mining Pool
Numerical models
Numerical stability
pubcrawl
Scalability
Sociology
Stability analysis
Statistics
Tamper resistance
biblio
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Measurement
Games
Wireless communication
pubcrawl
Resiliency
Industries
Reinforcement learning
Compositionality
Throughput
Predictive Metrics
provable security
Contextual Multi-Armed Bandit
link adaptation
RL algorithms security
security assessment
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »