Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Bayes methods
biblio
Security Risk Assessment of Information Systems in an Indeterminate Environment
Submitted by grigby1 on Fri, 08/26/2022 - 9:58am
information systems security
uncertainty
tools
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Information systems
Human behavior
Fuzzy Inference Scheme
expert systems
Computational modeling
Bayesian belief network
Bayes methods
biblio
Improving Classification Trustworthiness in Random Forests
Submitted by grigby1 on Wed, 08/03/2022 - 3:13pm
machine learning algorithms
pubcrawl
Conferences
Medical services
Computer crime
composability
Reliability
trustworthiness
Bayes methods
random forests
Bayesian networks
Classification Trustworthiness
Clinical Decision Support Systems
biblio
Adaptation of the Multi-pass social Engineering Attack Model Taking into Account Informational Influence
Submitted by aekwall on Wed, 03/23/2022 - 8:35am
security
Organizations
Computational modeling
Mathematical model
Analytical models
Scalability
Human behavior
Bayes methods
Adaptation models
pubcrawl
intensity of users interaction
model of informational influence
Social Engineering Attacks
social graphs
Social Agents
biblio
Prediction and Detection of Cyberattacks using AI Model in Virtualized Wireless Networks
Submitted by grigby1 on Tue, 03/15/2022 - 1:18pm
Predictive models
pubcrawl
Scalability
Data models
Computational modeling
Artificial Intelligence
Communication system security
wireless networks
Numerical models
Bayes methods
Scalable Security
Bayesian network
Detection of cyberattacks
Wireless Virtualization
biblio
System Component-Level Self-Adaptations for Security via Bayesian Games
Submitted by aekwall on Fri, 02/04/2022 - 9:34am
Computing Theory
resilience
Bayes methods
Bayesian game
composability
Computational modeling
Games
Metrics
object oriented security
pubcrawl
Resiliency
security
Self-Adaptation
software engineering
system analysis and design
Systems architecture
biblio
Structural Learning Techniques for Bayesian Attack Graphs in Cyber Physical Power Systems
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
data structures
Time factors
Time complexity
Structural Learning
Resiliency
real-time systems
pubcrawl
Predictive Metrics
power systems
Control Theory
composability
Boolean functions
Bayesian network
bayesian attack graph
Bayes methods
attack graphs
resilience
biblio
Bayesian Pruned Random Rule Foams for XAI
Submitted by grigby1 on Wed, 12/22/2021 - 11:54am
additive fuzzy systems
Bayes methods
Bayesian rule posteriors
Computational modeling
Conferences
Data models
fuzzy systems
generalized mixtures
Gray-scale
pubcrawl
resilience
Resiliency
rule foam
Scalability
uncertainty
xai
biblio
Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN
Submitted by grigby1 on Thu, 09/16/2021 - 1:12pm
Radio frequency identification (RFID)
Voronoi cells
Two dimensional displays
traffic characterization
security
RFIDs
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Adaptation models
radio frequency identification
pubcrawl
NFC
IoT
Human behavior
Computational modeling
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief
Submitted by grigby1 on Tue, 09/07/2021 - 12:56pm
Bayes methods
composability
control systems
Control Theory
Games
pubcrawl
Receivers
resilience
Resiliency
security
uncertainty
biblio
A Trust Management System for the IoT domain
Submitted by aekwall on Wed, 08/11/2021 - 1:51pm
Trust management
authorization
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
risk management
associated risk
Bayes methods
behavior
faces
Intern et-of-th ings
status
policy-based governance
Internet-scale Computing Security
1
2
3
4
5
6
7
8
9
next ›
last »