Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Software-Defined Networking for Improving Security in Smart Grid Systems
Submitted by aekwall on Mon, 03/18/2019 - 9:55am
Resiliency
wide-area security management
traditional smart grid systems
traditional smart grid architecture
software-defined networking
software defined networking
smart power grids
Smart Grids
smart grid security
Smart Grid
smart decision making
security of data
SDN-based smart grid systems
SDN based solutions
SDN
Scalability
attacks
pubcrawl
Protocols
power system security
power engineering computing
Metrics
mentioned security threats
main cyber-security objectives
IP networks
distributed security
Decision Making
cyber security
control systems
computer architecture
Big Data
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
A Framework for Making Effective Responses to Cyberattacks
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
attribution confidence
USG
U.S. government
suspected attacker
Risk
Response
private sector
policymakers
national intelligence community
Market research
Government
Escalation
effective response decision
Deterrence
decision makers
cyberattack
analysis
attribution
Companies
Decision Making
Computer hacking
Metrics
composability
pubcrawl
Human behavior
Big Data
human-in-the-loop security center paradigm
Computer crime
security of data
biblio
Computational Model of the User's Learning Process When Cued by a Social Versus Non-Social Agent
Submitted by grigby1 on Mon, 02/25/2019 - 3:19pm
Decision Making
pubcrawl
Human behavior
Scalability
Human Factors
Reinforcement learning
Social Agents
eye-tracking
gaze cueing
reversal
biblio
Vendor Track Record Selection Using Best Worst Method
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
multicriteria decision making
Supply Chain Risk Assesment
XYZ company
vendor valuation
vendor track record selection
vendor assessment
Track Record
Supplier Selection Problems
Supplier Selection
Seminars
Procurement
operations research
pubcrawl
MCDM
Indonesia
business process
business performance
Best Worst Method
analytic hierarchy process
Industries
supply chain management
Companies
Decision Making
Metrics
biblio
A risk assessment model for supply chain design. Implementation at Kuehne amp;\#x002B; Nagel Luxembourg
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
international regulations force enterprises
Supply Chain Risk Assesment
sustainable matters
sustainable development
sustainability
supply chain management
supply chain design
Supply Chain
risk assessment model
Performance
national regulations force enterprises
Nagel Luxembourg implementation
Logistics
Kuehne implementation
pubcrawl
indicators
green matters
Economics
decisions making
customers growing awareness
customer satisfaction
Companies
communication and information systems
risk management
Decision Making
supply chains
Metrics
biblio
Spam Detection Framework for Online Reviews Using Hadoop’ s Computational Capability
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
retail data processing
MapReduce
MapReduce feature
metadata
NetSpam
online review
online reviews
online shopping
parallel programming
Reliability
machine learning techniques
review dataset classification
spam detection framework
spam detection methods
spam detection procedure
spam features
spam review
spam reviews
unsolicited e-mail
spam detection
Business
Big Data
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
Metrics
pattern classification
internet
big data processing
Scalability
business decisions
Decision Making
Distribution functions
false reviews
feature type extraction
Hadoop
Hadoop computational capability
Labeling
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
Internet of battlefield things
wireless networks
war scenarios
telecommunication security
sensors
Scalability
Resiliency
resilience
pubcrawl
Poisson point process
mission-critical data
military communication
iobt
Internet of Things
Ad hoc networks
information dissemination
Human Factors
Geometry
Epidemics
Decision Making
critical information dissemination
coordinated decision-making
Computational modeling
combat efficiency
Biological system modeling
Battlefield
Analytical models
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »