Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network theory (graphs)
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 10:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
biblio
{Sparse resource allocation for linear network spread dynamics}
Submitted by el_wehby on Sun, 05/27/2018 - 9:35pm
Control of networks
network theory (graphs)
optimal control
spread processes
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 11:51am
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
A Factored MDP Approach to Optimal Mechanism Design for Resilient Large-Scale Interdependent Critical Infrastructures
Submitted by grigby1 on Tue, 02/27/2018 - 1:36pm
Linear programming
state spaces
security enhancement
Scalability
Resiliency
resilience
pubcrawl
power system security
power system reliability
power grids
optimal resiliency mechanism design
network theory (graphs)
network resilience
Metrics
Markov processes
Markov Decision Processes
action spaces
large-scale interdependent system
large-scale interdependent critical infrastructures
Human Factors
Human behavior
factored MDP approach
decision theory
cyber-physical dependencies
Cyber Dependencies
critical infrastructures
Control Theory
Compositionality
Cascading Failures
approximation theory
approximate linear programming
biblio
A Method for Hybrid Bayesian Network Structure Learning from Massive Data Using MapReduce
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
MapReduce
uncertain knowledge representation
styling
Structure Learning
security
search problems
score-and-search-based algorithm
Resiliency
pubcrawl
parallel processing
network theory (graphs)
Mutual information
Massive Data
Markov processes
Algorithm design and analysis
learning (artificial intelligence)
Knowledge representation
Information Reuse
Hybrid Learning
hybrid Bayesian network structure learning
distributed hybrid structure learning algorithm
directed graphs
Data models
data mining model
Data mining
constraint-based algorithm
Bayes methods
Bayesian network
biblio
Micro-Community detection and vulnerability identification for large critical networks
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Metrics
vulnerability identification
vulnerability detection
Vulnerability
social community networks
Resiliency
pubcrawl
optimisation
network theory (graphs)
modularity maximization
microcommunity detection techniques
microcommunity clustering algorithm
micro level clustering
algebraic connectivity
MCC algorithm
Large Networks
large critical networks
Human Factors
Human behavior
graph partitioning
Fiedler Eigenvector
Eigenvector
Eigenvalue
Decision support systems
Compositionality
community detection
biblio
Using Set-Based Heading to Improve Mobile Agent Movement
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
network theory (graphs)
Topology
Time measurement
situational security
situational awareness
set-based heading
security of data
security
scale-free graph
random walk
random processes
nonheading movement technique
cover time
network (graph)
movement method
mobile agents
mobile agent movement
minimum distance graph
History
heading
Geography
foraging application
Electronic mail
dynamic graph topology
biblio
Periodic and event-triggered communication for distributed continuous-time convex optimization
Submitted by BrandonB on Thu, 04/30/2015 - 11:56am
event-triggered communication
Zeno behavior
Topology
synchronous periodic communication scheme
strongly connected weight-balanced directed graph
privacy preservation properties
privacy
periodic communication
Optimization algorithms
network theory (graphs)
network optimization problem
global cost function
Algorithm design and analysis
distributed continuous-time convex optimization
distributed continuous-time algorithm
directed graphs
cost functions
Cost function
convex programming
Convex functions
convex function
convergence
Control of networks
connected undirected graph
« first
‹ previous
1
2
3
4
next ›
last »