Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Random Manhattan Indexing
Submitted by BrandonB on Tue, 05/05/2015 - 12:29pm
Mathematical model
Vectors
vector space model
text analysis
sparse Cauchy random projections
RMI
retrieval models
random projection
random Manhattan indexing
natural language text
Computational modeling
Manhattan distance
L1 normed VSM
indexing
Equations
dimensionality reduction technique
dimensionality reduction
data reduction
Context
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 12:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 11:31am
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
biblio
Taxonomy of Attacks for Agent-Based Smart Grids
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
grid computing
taxonomy of attacks
taxonomy
software agents
Smart Grids
Smart Grid
security of data
security feature
security
power systems
National Science Foundation Workshop
Mathematical model
Load modeling
large scale environment
information flow direction
agent-based smart grids
Generators
Equations
dynamic environment
distributed environment
cyber-physical systems
cyber-physical process
cyber-physical causality
Cyber Physical Systems (CPS)
cyber detection scheme
cyber attack detection scheme
critical infrastructure
attack classification
agents
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
moving-target defense
VM migration-snapshotting
uncertainty
simulation
service attack surface
security of data
security
S-shaped generalized logistic function
risk modeling
replacement pool
Probes
probability
probabilistic MTD service deployment
Probabilistic logic
probabilistic algorithm
moving-target defense strategy
attack-surface heterogeneity-and-dynamics awareness
Mathematical model
Information systems
homogeneity problem
heterogeneous attack surfaces
Equations
dynamic probability
dynamic attack surfaces
diversity-compatibility
deep automation
configuration staticity
cloud-specific features
cloud-based service security
cloud infrastructures
Cloud Computing
attacker intelligence
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
biblio
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
textual modeling
multiple-author documents
Predictive models
Probabilistic topic models
receiver operating characteristic curve
ROC curve
SAT model
supervised author-topic model
text analysis
meta-data
topic representations
topic-based generative models
Training
unsupervised AT model
Unsupervised Learning
unsupervised learning technique
Vectors
Computational modeling
area under curve
AUC
author-topic model
authorship attribution
authorship learning
authorship prediction
Bayesian inference
Big Data
Analytical models
Data models
dimension reduction
Dirichlet distribution
High dimensional texual data
information discovery
Mathematical model
meta data
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
next ›
last »