Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
inference mechanisms
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
pubcrawl
resilience
Resiliency
telecommunication security
sensor fusion
Artificial Intelligence
cognition
Cost accounting
inference mechanisms
probability
uncertainty
threat assessment
marine communication
Sensitivity
underwater acoustic communication
uncertainty handling
Damage Assessment
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
information fusion
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
Scalability
Ontologies
Task Analysis
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
ontologies (artificial intelligence)
cryptocurrencies
fuzzy set theory
smart contracts
contracts
cognition
Semantics
inference mechanisms
Ethereum blockchain
fuzzy reasoning
blockchain systems
Pareto optimisation
best satisfiability degree
blockchain smart contracts
fuzzy ontologies
fuzzy ontology reasoning task
Fuzzy sets
Pareto-optimal solutions
partial agreement
Fuzzy Cryptography
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
security of data
Internet of Things
IoT applications
Trusted Computing
Data models
learning (artificial intelligence)
pubcrawl
composability
trust
trustworthiness
sensor fusion
Internet of Things applications
inference mechanisms
Numerical models
uncertainty handling
Temperature sensors
Temperature distribution
authentic forged image data
complementary multimodal data
Dempster-Shafer Theory
DST framework
image sensor data
image sensors
IoT image sensor data
IoT sensor data
multimodal
numerical data
temperature sensor data
trustworthy measure
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
Adaptation models
Predictive models
pubcrawl
resilience
Resiliency
optimization
Scalability
Computational modeling
Stochastic processes
Load modeling
optimisation
ensemble model
inference mechanisms
approximation theory
parallel algorithms
uncertainty handling
asynchronous parallel surrogate optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
parallel optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
security of data
Ontologies
security
Resiliency
pubcrawl
standards
Databases
Vulnerability
Economics
finance
ontologies (artificial intelligence)
Ontology
Communication networks
inference mechanisms
Compositionality
CVE
capec
CWE
industry public standards
Inference Rules
information security public databases
knowledge inference
public information systems
security vulnerability ontology model
vulnerability class
weakness class
Information Reuse and Security
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
security of data
Scalability
data privacy
Trusted Computing
Data models
Human behavior
pubcrawl
Computational modeling
tools
Decision Making
text analysis
Correlation
Data mining
Human Factors
Software systems
inference mechanisms
Numerical models
trust model
psychology
affective aspects
evaluation system
logical protection
malicious people
nonpersonality-wise approaches
online human-fed evaluation systems
personality models
trust computation
trust inference
trust mechanisms
Expert Systems and Privacy
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security of data
enterprise networks
Ontologies
security
network security
Resiliency
pubcrawl
composability
graph theory
Mobile handsets
Metrics
tools
Decision Making
risk management
cyber-attacks
ontologies (artificial intelligence)
security assessment
security problems
cognition
Semantics
inference mechanisms
attack graph
security knowledge
Inference algorithms
integrating semantic reasoning
ontology- and graph-based approach
risk assessment experience
scalable security analysis
Security Ontology
semantic reasoning
test networks
Dynamic Networks and Security
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
Chained Attacks
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
CPS domain
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
cyber-physical systems
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
power engineering computing
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
biblio
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
computer network security
Resiliency
pubcrawl
composability
Production
Decision Making
decision-making
computer security
Communication networks
Security analysis
cognition
industrial control
inference mechanisms
industrial control network system
formal logic
forward reasoning
Industrial control network
industrial control network security analysis
reasoning method
strong relevant logic
Autonomic Security
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
attack graphs
attack paths
composability
computer network security
corrective actions
cyber defense
cyber security
graph theory
inference mechanisms
multistage cyberattacks
MulVAL inference engine
Predictive Metrics
pubcrawl
Resiliency
Security Evaluation
security level estimation
security problems
situational awareness
tag
topological attack graph analysis tool
1
2
3
4
5
next ›
last »