Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Empirical Validation of System Dynamics Cyber Security Models
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
model builder
system dynamics model validation
system dynamics cyber security models
System Dynamics
standards
simulation and modeling
Servers
security of data
Scalability
Resiliency
pubcrawl
Numerical models
model structure
False Data Detection
Mathematical model
Human behavior
Expert Systems and Security
empirical validation
empirical structural test
empirical behavior test
cyber-attacks/defenses
cyber security modeling
cyber security
continuous simulation
computer security
Computational modeling
biblio
Reinforcement Learning inspired Deep Learned Compositional Model for Decision Making in Tracking
Submitted by grigby1 on Mon, 10/05/2020 - 1:01pm
previous location
neural nets
object tracking
occlusion handling
partial occlusions
partially observable Markov decision making
penalty based training
pose estimation
pose estimation capabilities
multiple large video datasets
pubcrawl
Reinforcement learning
skeleton based part representation
Streaming media
target tracking
tracker
tracking
video signal processing
heuristic methods
Compositional Models
Compositionality
Computational modeling
computer science
Decision Making
deep learned compositional model
Deep Neural Network
deep reinforcement
cluttered background
human bodies
human inputs
image representation
incessant decision making
learning (artificial intelligence)
Markov processes
Mathematical model
biblio
Decentralized Verification for Dissipativity of Cascade Interconnected Systems
Submitted by grigby1 on Mon, 10/05/2020 - 12:49pm
learning-enabled subsystems
verification process
verification
subsystem parameters
Stability analysis
reinforcement learning algorithm
q-learning
pubcrawl
multivariable systems
model-free learning structure
minimum knowledge
Matrices
Mathematical model
linear subsystems
autonomous systems
learning (artificial intelligence)
largescale networks
large-scale cascade interconnections
Interconnected Systems
dissipativity properties
dissipativity
decentralized verification rule
Couplings
control system synthesis
Compositionality
cascade systems
cascade interconnected systems
biblio
On Aggregation of Information in Timing Attacks
Submitted by grigby1 on Mon, 10/05/2020 - 12:48pm
Information Flow
timing attacks
timing
system vulnerability
Side-Channels
real-world attacks
real-world adversaries
pubcrawl
program diagnostics
program compositionality
multiple timing measurements
Mathematical model
information-flow analysis
Compositionality
information aggregation reasoning
high-profile timing attacks
divide-and-conquer method
divide and conquer methods
cryptosystems
Cryptography
Computational modeling
Analytical models
Aggregates
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures
Submitted by aekwall on Mon, 10/05/2020 - 10:46am
cyber-physical systems security
CPS resilience
wastewater treatment plant
wastewater treatment
System Dynamics
situational awareness and security metrics
single system-wide measure
Resilience Metrics
resilience indexes
remote monitoring
general-purpose evaluation methodology
digital computers
cyber-physical system resilience
critical feedback control loop
bulky system logs
CPSS
security of data
Critical Infrastructure Protection
resilience
Indexes
cyber physical systems
Cyber Attacks
Data mining
Mathematical model
risk management
internet
pubcrawl
Resiliency
critical infrastructures
cyber security
security
Monitoring
biblio
Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
Dual RSA
confinement
Wiener'
Trial Division
s Factorization
s attack
Rivest Shamir and Adleman algorithm
Public Key cryptographic algorithm
phony modulus
online Security
Mersenne prime numbers
Mersenne Prime
Fermat'
factorization attack
encryption
decryption techniques
public-key cryptography
RSA algorithm
Ciphers
public key cryptography
cyber-physical systems
encryption techniques
privacy
Mathematical model
composability
pubcrawl
Resiliency
biblio
Trust and Deception in Hypergame Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:40pm
Compositionality
Computer Theory and Trust
temporal hypergame model
model decision
misperception
hypergame theory
hypergame theoretic framework
conflict
attacker-defender hypergame
formal model
Atmospheric modeling
game theory
sensors
Temporal Logic
Games
Mathematical model
Decision Making
Computational modeling
composability
pubcrawl
deception
biblio
Fuzzy-GRA Trust Model for Cloud Risk Management
Submitted by aekwall on Mon, 09/21/2020 - 2:40pm
gray relational theory
Trusted Computing
trust model
Software
security vulnerabilities
security of data
security
risk management
pubcrawl
Peer-to-peer computing
Mathematical model
local trust model
grey systems
Adaptation models
gray relational analysis
global trust model
Fuzzy-GRA trust model
fuzzy set theory
fuzzy mathematics
Computer Theory and Trust
Computational modeling
Compositionality
composability
cloud safety
cloud risk management
Cloud Computing
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 10:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
biblio
Creation of Adversarial Examples with Keeping High Visual Performance
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
visualization
intelligence
image recognition technology
human readability
high visual performance
FGSM
convolutional neural network (CNN)
character string CAPTCHA
character recognition
character images
artificial
CAPTCHA
captchas
image recognition
convolutional neural network
learning (artificial intelligence)
adversarial examples
image classification
Resistance
Perturbation methods
composability
Mathematical model
security
Human behavior
pubcrawl
Neural networks
convolutional neural nets
CNN
machine learning
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »