Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Bayes methods
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
insider threat
security of data
Training
security
Insider Threat Detection
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
Identification
Information systems
information system security
Classification algorithms
trees (mathematics)
Metrics
probability
User behavior
Bayes methods
Accuracy
rough set theory
set theory
attribute information database
Bayes network
demensionality reduction
feedback tree
impersonation detection
insider threat identification system model
minimum risk Bayes decision
rough set
rough set dimensionality reduction
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
security of data
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
Economics
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
Predictive Metrics
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
FA
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
privacy
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
Compositionality
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
Bayes methods
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
network information preservation
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
security
Monitoring
pubcrawl
resilience
Resiliency
computer network security
Scalability
networked control systems
Industrial Control Systems
intrusion detection system
Denial of Service attacks
DoS attacks
Packet loss
telecommunication control
Games
energy consumption
NCS
IDS
game theory
Bayes methods
Bayes rule
Incomplete information
incomplete information based on game theory
networked control system security
one-shot game
biblio
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
API
APIs
application programming interface
Bayes methods
CIDDS-001 dataset
Compositionality
cyber security
cybersecurity organizations
deep learning
hybrid feature selection
IDS
internet
intranet
intranets
Intrusion Detection
intrusion detection system
Intrusion Detection System (IDS)
K-NN
learning (artificial intelligence)
machine learning
Naive Bayes Classifiers
nearest neighbour methods
network security threats
neural nets
NSL-KDD dataset
pattern classification
performance indicator metrics
pubcrawl
resilience
Resiliency
security of data
self-learning-based classification algorithms
Support vector machines
vulnerable source code
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
Cryptography
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Measurement
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
energy management
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
trust evaluation
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Cross Site Scripting
Bayes methods
composability
cookies
cross-site scripting
detection script
feature extraction
k-nearest neighbour
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
Naive Bayes
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Training data
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
Bayes methods
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
computer network reliability
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
coupling model
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
power information
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
Bayes methods
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
feature dimensionality reduction approach
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
IP networks
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
network traffic
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
biblio
Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:48pm
antijamming mechanism
attacker psychological behavior
Bayes methods
delays
dynamic psychological game theory
game theory
Games
Human Factors
Internet of Things
Internet of Things (IoT)
iobt
IoBT network
Jamming
learning (artificial intelligence)
psychological game
psychological self-confirming equilibrium
psychology
pubcrawl
Scalability
secure Internet of Battlefield Things systems
security
soldier
soldier IoBT transmission link
time-critical mission
1
2
3
4
5
6
7
8
9
next ›
last »