Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cost accounting
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
information fusion
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
Damage Assessment
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
pubcrawl
uncertainty handling
underwater acoustic communication
Sensitivity
marine communication
threat assessment
uncertainty
probability
inference mechanisms
Cost accounting
cognition
Artificial Intelligence
sensor fusion
telecommunication security
Resiliency
resilience
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Development of Quantitative Methods for Evaluating Intellectual Resources in the Digital Economy
Submitted by grigby1 on Mon, 11/02/2020 - 12:35pm
mathematical approach
valuation of intellectual resources
uncertainty
Technological innovation
Resiliency
resilience
quantitative methods
quantitative evaluation
pubcrawl
Production
policy-based governance
capitalization
intellectual resources
intellectual property valuation
intellectual property security
intellectual property
Industries
industrial property
Economics
digital economy
Cost accounting
composability
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
risk assessment
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
parameter values
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
cyber-physical systems
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
attack-fault trees
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 10:25am
Infrastructure security
star topology
simultaneous game
Servers
security of data
security
Scalability
resource allocation
pubcrawl
Predictive Metrics
optical switches
Numerical models
Nash Equilibrium
interdependency levels
Interdependencies
Integrated optics
Attack Strategies
infrastructure resilience
infrastructure design
Human Factors
Games
game-theoretic defense strategy
game theory
game theoretic security
external attacks
defense effort
cyber-physical infrastructures
Cost accounting
constituent systems
bus structure
basic topological structures
biblio
Input Elimination Transformations for Scalable Verification and Trace Reconstruction
Submitted by aekwall on Mon, 03/16/2020 - 9:38am
2QBF variant
verification scalability
verification complexity
trace reconstruction
scalable verification
netlist transformations
merging
input reparameterization
input elimination transformations
fast- lossy preprocess
Cost accounting
connectivity verification
Resiliency
model checking
formal verification
Registers
Compositionality
Predictive Metrics
Scalability
Logic gates
Complexity theory
computational complexity
pubcrawl
biblio
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
Computational modeling
Cost accounting
encryption
Human behavior
Human Factors
Load management
privacy
privacy preservation
pubcrawl
resilience
Resiliency
Scalability
Smart Grid Privacy
Smart grids/cyber-physical systems
strategy-proofness
Vehicle-to-grid
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 12:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation