Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
serious privacy leakage
biblio
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
Submitted by grigby1 on Fri, 01/22/2021 - 1:37pm
Metrics
stealthy method
Stackelberg games
serious privacy leakage
security of data
Resiliency
resilience
reinforcement learning (RL)
pubcrawl
policy hill-climbing algorithm
policy hill-climbing
optimal network security
network attacks
Nash Equilibrium
multistage plan
Multistage Maze Network Game
game theoretic security
Markov processes
learning (artificial intelligence)
Human behavior
game-theoretic framework
game theory
game model
continuous method
attack graphs
APT
advanced persistent threats
advanced persistent threat
Predictive Metrics
Scalability
Human Factors
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior