Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Towards Swarm Intelligence Architectural Patterns: an IoT-Big Data-AI-Blockchain convergence perspective
Submitted by aekwall on Mon, 01/27/2020 - 10:24am
IoT
pubcrawl
composability
Swarm Intelligence
Decision Making
Compositionality
AI
Big Data Analytics
Patterns
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Decentralized Multi-Sensor Scheduling for Multi-Target Tracking and Identity Management
Submitted by grigby1 on Tue, 01/21/2020 - 11:38am
pubcrawl
wireless sensor networks
telecommunication scheduling
target tracking
target information
state estimation
sensor fusion
sensor dynamic constraints
Scalability
resilience
closed-loop multitarget tracking algorithm
primary sensor
multiple secondary sensors
identity management method
identity management algorithm
Identity management
Human behavior
Decision Making
decentralized multisensor scheduling
biblio
Edge Learning Based Green Content Distribution for Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
quality of service
intelligent path selection
internet
Internet of Things
learning (artificial intelligence)
network distribution
network quality
network traffic
pubcrawl
intelligent
real-time systems
resilience
Resiliency
revolutionary future networking architecture
Routing
Scalability
telecommunication traffic
content distribution
information-centric networking
information-centric internet of things
Information Centric Networks
Information Centric Network
IC-IoT requirements
IC-IoT
green content distribution scheme
green computing
encoding
edge learning
edge computing
distributed coding based content transmission
distributed coding
Decision trees
Decision Making
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
The Use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
passive barrier elements
tools
testing
socio-economic effects
socio-economic development
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
protection
physical protection system
passive barriers
data analysis
method
Mechanical factors
mechanical barriers
Human behavior
fuzzy set theory
expert systems
expert judgement
expert
delays
delay time values
delay time
Decision Making
Databases
biblio
The cyber deterrence problem
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
Decision Making
strategic assets
state actors
rational deterrence theory
Punishment
Presses
Nuclear weapons
missiles
leverage relevant examples
hackers
digital tools
digital age
deterrence frameworks
Deterrence
denial
Scalability
cyber deterrence problem
cyber
cultural aspects
cross-domain signaling
Credibility
cognitive theories
adept hackers
Cyberspace
resilience
tools
Computer crime
pubcrawl
Human behavior
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
unlicensed cognitive devices
telecommunication security
spectrum sensing data falsification attack
spectrum scarcity challenges
spectrum observations
spectrum band
signal detection
sensors
Resiliency
resilience
q-out-of-m rule scheme
Ad hoc networks
performance evaluation
modified Z-test
Licenced users
fading channels
Decision Making
Copper
Cognitive Radios
cognitive radio technology
Cognitive Radio Security
cognitive radio ad hoc networks
cognitive radio
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »