Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network theory (graphs)
biblio
UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
Submitted by aekwall on Tue, 06/01/2021 - 12:27pm
Microprogramming
UEFI
Trusted Computing
state transition graph
security
Resiliency
pubcrawl
pagerank
network theory (graphs)
Computing Theory
Human Factors
Computing Theory and Trust
Computational modeling
composability
Bayesian networks
Bayes methods
Analytical models
trust
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
Hamming space
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
network coding
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
composability
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
learning (artificial intelligence)
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
Unsupervised Discovery Of Semantically Aware Communities With Tensor Kruskal Decomposition: A Case Study In Twitter
Submitted by aekwall on Mon, 02/15/2021 - 3:47pm
recursive community structure
functional Twitter elements
hashtag semantics
heavy degree distribution tail
high clustering coefficient values
higher order analytics
higher order counterpart
Julia
Kruskal decomposition
low diameter
news aggregators
Political Campaigns
politics
rank one tensors
functional coherency
semantic weight
semantically aware communities
Structural coherency
structural Twitter elements
substantial empirical evidence
synthetic graph generation models
tensor algebra
tensor kruskal decomposition
tensor representation
Tucker tensor decomposition
Twitter subgraph
unofficial form
unsupervised discovery
tensors
graph theory
social networking (online)
Twitter
Metrics
social network
network theory (graphs)
cyber physical systems
Unsupervised Learning
Semantics
Compositionality
Periodic structures
singular value decomposition
SVD
pubcrawl
Tucker decomposition
decomposition
analytical methodologies
Blogs
clustered graph spectrum
Community discovery
community structure discovery
compact community size distribution
digital marketing
Facebook groups
fact checking
followfollower relationships
biblio
On Some Universally Good Fractional Repetition Codes
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
data storage
universally good Fractional Repetition codes
partial regular graph
multidimensional optimization problem
minimum distance bound
heterogeneous DSS
encoded packet replication
distributed storage systems
Data storage systems
storage overhead
coding theory
network coding
network theory (graphs)
pubcrawl
Compositionality
optimisation
computer network reliability
network security
storage management
Cryptography
security
optimization
computer network security
Resiliency
resilience
Metrics
biblio
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
Heating systems
Human Behavior and Cybersecurity
topological sort networks
network theory
movement association
mixed methods
graph topological ordering
dynamic decision-making
adversarial team
adversarial movement complexity
adaptive human behavior
Human behavior
security of data
cyberattacks
integrated circuits
Sorting
network theory (graphs)
social network
Training
Decision Making
tools
graph theory
pubcrawl
Computer crime
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
A New Metric to Quantify the Vulnerability of Power Grids
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
Matrices
DC load flow
electrical equations
grid geometry
Hybrid topological model
IEEE 118-bus system
industrial software
load distribution
load-flow equations
blackout
Network capacity reserve metric
power blackouts
power generators
power systems
topological indicators
vulnerability lines
Power Grid Vulnerability Assessment
pubcrawl
Load flow
Cascading Failures
network theory (graphs)
complex network theory
power system reliability
failure analysis
Measurement
Metrics
power grids
composability
Vulnerability
Mathematical model
Generators
Resiliency
resilience
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
1
2
3
4
next ›
last »