Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
Mathematical model
variable perceived value congruence
Task Analysis
self-determination theory
Security policy compliant behaviour
Security Policies Analysis
security performance
security of data
Saudi Arabia
relatedness
pubcrawl
policy-based governance
Personnel
perceived value congruence
perceived legitimacy
organisational aspects
autonomy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
information security
Human Factors
Fortune 600 organization
employees motivation
Electronic mail
Data models
computer security
competence
collaboration
behavioral research
biblio
Modeling and measurement internal threat process based on advanced stochastic model*
Submitted by grigby1 on Fri, 11/20/2020 - 12:52pm
security model
Stochastic Computing Security
threat behaviors
stochastic petri nets
risk measurement
real-time risk measurement
Petri net computing characteristics
network protection
internal threats
Internal Threat
illegal data
firewall-password model
advanced stochastic model
Petri nets
security of data
complex networks
risk analysis
Stochastic processes
Computational modeling
Data models
Scalability
Mathematical model
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
criticality metric
Resilient Security Architectures
secure cyber infrastructure
resilient cyber infrastructure
model attacker
metric measure
lateral propagation
information flow dependency
host criticality
graph spectral matrices
EDS cyber infrastructure
defense-in-depth architecture
Cyber Resiliency
security of data
Resiliency
Energy Delivery Systems
system design
Firewalls (computing)
resilience
Indexes
Measurement
Workstations
Mathematical model
graph theory
pubcrawl
Servers
biblio
Compositional Data Analysis with PLS-DA and Security Applications
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
Euclidean distance
Information Reuse and Security
spam filters
PLS-DA algorithm
partial least squares discriminant analysis
Least squares approximations
isometric log ratio transformation
information system security applications
ILR
data-based power transformation
data science models
compositional vectors
compositional data analysis
Compositional data
Aitchison transformation
Intrusion Detection
Loading
Compositionality
statistical analysis
data analysis
Mathematical model
spam filtering
unsolicited e-mail
standards
pubcrawl
Resiliency
Electronic mail
Data models
security of data
biblio
An AI Software Test Method Based on Scene Deductive Approach
Submitted by grigby1 on Mon, 11/02/2020 - 10:42am
Mathematical model
Software Testing
Software algorithms
Software
scene deductive approach
Scalability
road vehicles
pubcrawl
program testing
position control
AI software testing method
machine learning algorithms
intelligent tracking car
i/o systems security
i-o systems security
automobiles
artificial intelligence software
Artificial Intelligence
algorithm complexity
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
biblio
EagleEye: A Novel Visual Anomaly Detection Method
Submitted by aekwall on Mon, 10/12/2020 - 10:44am
Anomaly Visualization
Human Behavior and Cybersecurity
visual anomaly detection method
two-dimensional space
System Call Trace
system call
modified t-SNE
human eyes
EagleEyes efficiency
EagleEye view
dimensionality reduction
dimensional reduction
data depth
Australian Defence Force Academy Linux Dataset
Intrusion Detection
Human behavior
normal behaviors
abnormal behaviors
Two dimensional displays
Three-dimensional displays
data visualisation
principal component analysis
Data visualization
Mathematical model
pubcrawl
Linux
security of data
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »