Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
probability
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
Decoding
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
secure communication
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
physical-layer security
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
pubcrawl
resilience
Resiliency
telecommunication security
sensor fusion
Artificial Intelligence
cognition
Cost accounting
inference mechanisms
probability
uncertainty
threat assessment
marine communication
Sensitivity
underwater acoustic communication
uncertainty handling
Damage Assessment
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
information fusion
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
privacy
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
Compositionality
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
Bayes methods
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
network information preservation
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
biblio
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Reliability
Receivers
Compositionality
probability
channel capacity
channel coding
physical layer security
covert communication
covert channels
additive white Gaussian noise channels
AWGN channels
discrete memoryless channels
MIMO communication
secrecy capacity
blocklength
covert nats
effective secrecy
energy undetectability constraints
LPD communication
maximal covert coding rate
MIMO AWGN channels
multiple-input multiple-output AWGN channels
order-optimal scaling law
square root law
stealth communication
unit-rank MIMO
Zinc
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
Cryptography
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
privacy
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
Steganography
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
flipping operations
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
risk management
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
industrial control
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
Oils
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
fuzzy consistency matrix
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
biblio
Research on Automatic Generation and Analysis Technology of Network Attack Graph
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
attack graphs
attack target asset value
automatic generation
composability
dependence attack graph
edge authority attack graph
graph theory
network attack graph
network security metrics
Network Security Reinforcement
network security reinforcement algorithm
network vulnerability index
optimisation
optimization
Predictive Metrics
probability
Probability-based Network Vulnerability Measurement
pubcrawl
Resiliency
security of data
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
computer network security
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
composability
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
complex network
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
hierarchical attack graph
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 11:53am
timing information
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Iterative methods
Metrics
Stochastic processes
probability
Games
Temporal Logic
timing
stochastic games
actuators
CPS
actuator attacks
actuator security
Clocks
road traffic control
control input
control synthesis
durational stochastic game
finite state controller
metric interval temporal logic objectives
Power capacitors
time-sensitive
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
gradient methods
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
markov chain
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
telecommunication computing
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
1
2
3
4
5
6
7
8
9
…
next ›
last »