Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
potential physical impacts
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
command injection attacks
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
Global Positioning System
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
security of data
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
biblio
Instance-based learning in dynamic decision making
Submitted by Katie Dey on Fri, 09/13/2019 - 9:17pm
Dynamic decision making
Instance-based learning
cognitive modeling
Decision Making
Water purification plant
Cognitive Security
Articles of Interest
C3E 2019
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
Truth-Aware Optimal Decision-Making Framework with Driver Preferences for V2V Communications
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
Trusted Computing
pubcrawl
reported road events
resilience
Resiliency
Roads
Safety
Scalability
sensors
trust-aware decision-making framework
policy-based governance
truth-aware optimal decision-making framework
utility maximization framework
V2V communications
vehicle-to-vehicle communications
vehicles
vehicular ad hoc networks
vehicular traffic stream
verifiable transmitter
false data
appropriate human preference factors
Bayes rule
collaboration
data trustworthiness
Decision Making
decision-making process
Dempster Shafer Theory
event belief
Accidents
false information
false trust
incorporate driver preferences
Intelligent Transportation System
Intelligent Transportation Systems
malicious actors
multiple-vehicle attack
optimal action
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 10:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
Towards Situational Awareness of Botnet Activity in the Internet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 3:12pm
deep learning
word embedding
mirai
long short term memory networks
situational awareness
cyber situational awareness
Data Analytics
Insurance
critical infrastructures
DDoS
botnet
Computer crime
Servers
malware
IoT
learning (artificial intelligence)
invasive software
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
security of data
risk management
Internet of Things
data privacy
biblio
SCPN-Based Game Model for Security Situational Awareness in the Intenet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 3:12pm
security situational awareness
typical attack scenarios
stochastic colored Petri net
Smart homes
smart home environment
security situational awareness model
SCPN-based game model
SCPN
potential attack paths
IoT-based smart environment
IoT-based SCPN
heterogeneous devices
GT
complex smart environment
situational awareness
IoT
Petri nets
computer network security
Androids
game theory
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
Games
security
Internet of Things
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
information and communication technology
signal processing security
Signals Intelligence
Signal Intelligence
military operations
military computing
intelligence information
Information systems
information processing system
information processing
information processes
Resiliency
electronic warfare
Cyberspace
cybernetics
cybernetic environment
Decision Making
Metrics
component
composability
pubcrawl
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »