Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
Repeated game
optimal strategic behavior
power engineering computing
power grid security schemes
power system
power system security
power transmission lines
Predictive Metrics
privacy
pubcrawl
Monitoring tools
Resiliency
Scalability
security
security of data
smart grid security
Smart Grids
smart power grid
smart power grids
strategic analysis
game theoretic approach
attack-defense budget
attacker-defender game
attacker-defender interaction
attacker-defender repeated game
attacker-defender strategic interaction
cyber control
Cyber-physical attacks
cyber-physical systems
game payoffs calculation
and budget limitation
game theory
Games
generation power
game theoretic security
Human Factors
IEEE 39 bus benchmark system
Mathematical model
Metrics
Monitoring
biblio
Social Action in Socially Situated Agents
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
Evolution
Social Agents
traditional action
sociotechnical systems
Socio technical systems
socially situated agents
social self awareness
social action
shared world
Rivers
interacting systems
goal-rationality
evolutionary instability
Scalability
behavioural instability
social sciences
software agents
interactive systems
Human Factors
psychology
Interference
Mathematical model
multi-agent systems
Neurons
pubcrawl
Task Analysis
biblio
Social Analysis of Game Agents: How Trust and Reputation can Improve Player Experience
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
computer games
Social Agents
video games
social interactions
Social Behavior
social analysis
Settlers of Catan
reputation models
reputation
NPC agents
nonplayer character behavior
multiplayer games
interactive games
Intelligent Agents
gaming experience
game agents
Scalability
autonomous agents
artificial intelligence techniques
Artificial Intelligence
Buildings
Human Factors
human computer interaction
Urban areas
Proposals
Games
bots
trust
Mathematical model
multi-agent systems
Roads
pubcrawl
biblio
Influence of Deactivated Agents in Social Networks: Switching Between French-De Groot Models and Friedkin-Johnsen Model
Submitted by aekwall on Mon, 02/10/2020 - 11:07am
control
Social Agents
social sciences
Remote control
geophysical techniques
Friedkin-Johnsen model
French-De Groot models
deactivation model
deactivated agents
De Groot
complex mechanism
Consensus
Scalability
Biological system modeling
Switches
Human Factors
distortion
network theory (graphs)
Mathematical model
Economics
social networks
social networking (online)
pubcrawl
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support
Submitted by aekwall on Mon, 01/20/2020 - 11:00am
Hardware
tools
security-critical hardware implementations
Scalability
Resiliency
pubcrawl
Post /Pre silicon analysis
multiple fault injection support
Mathematical model
Lightweight Ciphers
lightweight block ciphers
Integrated circuit modeling
idealized fault models
hardware-oriented structural cipher descriptions
hardware-oriented framework
hardware-oriented algebraic fault attack framework
actual implementation
framework
field-programmable gate array platform
field programmable gate arrays
fault injector
Fault injction attack
Cryptography
conjunctive normal form clauses
Circuit faults
Ciphers
cipher implementations
Cipher
Analytical models
algebraic fault attack tool
algebraic equations
algebra
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »