Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Digital Ant Mechanism and Its Application in Network Security
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
mechanisms
tools
Task Analysis
system architecture
sensors
security
Resiliency
pubcrawl
particle swarm optimization
Network Security Architecture
network security
agents
distributed self-organization cyberspace defense paradigm
digital ants system
digital ants
digital ant technology
digital ant mechanism
decision-making
Decision Making
computer network security
Communication networks
biblio
Uncertainty-Aware Opinion Inference Under Adversarial Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
Robustness
Probabilistic logic
probabilistic model
probabilistic soft logic
probability
Probability density function
PSL
pubcrawl
resilience
Resiliency
possible adversarial attacks
security of data
Silicon
Training
uncertain evidence
uncertainty
uncertainty-aware opinion inference
unknown opinions
white box adversarial attacks
White Box Security
data mining tasks
adversarial collective opinion inference
adversarial evidence
black box adversarial attacks
collective subjective logic
composability
Compositionality
computational complexity
CSL
Data mining
Adv-COI
Data models
Decision Making
highly scalable opinion inference
inference mechanisms
learning (artificial intelligence)
logic-rule based structured data
Metrics
minimax techniques
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Hybrid Route Recommender System for Smarter Logistics
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
unmaintained roads
supply chain industry face
routing techniques
Roads
road surface conditions
pothole
poor road conditions
multiple recommendation techniques
hybrid route recommender system
content based filtering
hybrid
Accelerometers
road vehicles
recommender system
Human Factors
Transportation
fuzzy set theory
Decision Making
Logistics
Global Positioning System
collaborative filtering
pubcrawl
Resiliency
Scalability
biblio
SCORE: A Security-Oriented Cyber-Physical Optimal Response Engine
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
security of data
power system reliability
power system resilience
power system security
power system stability
pubcrawl
pure cyber-physical states
Relays
resilience
Resiliency
power system operators
security-oriented cyber-physical optimal response engine
Smart Grids
state transition model
substation power systems
Substations
System recovery
transmission line overflow
value and policy iteration
value iteration techniques
Decision Making
cyber physical systems
attack escalation
automatic decision making engine
automatic optimal response systems
Cascading Failures
Computational modeling
cyber-physical decision support system
cyber-physical systems
cyberattack
CPS resilience
Decision support systems
Engines
hybrid cyber-physical states
Markov Decision Process
Markov processes
MDP
optimal response
policy iteration techniques
power engineering computing
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »