Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
pubcrawl170107
biblio
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
data analysis
Data Analytics
data privacy
digital repositories
estimation
game theoretic study
game theory
Games
incentive schemes
Nash Equilibrium
Noise
Non-cooperative game
non-monetary incentives
nonmonetary incentives
personal information
population estimate
privacy
privacy implications
pubcrawl170107
pubcrawl170108
public good
social network sites
social networking (online)
Sociology
Statistics
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
anti-virus
association rule
association rules
community detection
computer viruses
Data mining
dynamic monitoring
graph theory
graph-based method
Malicious URL
malicious URL prediction
malware
Mobile communication
Monitoring
network bandwidth
program diagnostics
pubcrawl170107
pubcrawl170108
static analysis
traditional anti-virus technology
Uniform resource locators
biblio
The optimal contracts in continuous time under Knightian uncertainty
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
continuous time system
continuous time systems
contracts
differential equations
financial management
g-expectation framework
Knightian uncertainty
optimal contract
optimal contracts
optimal control
optimal control theory
optimisation
optimization
principal-agent problems
pubcrawl170107
pubcrawl170108
TV
uncertainty
Yttrium
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
Algorithm design and analysis
Complexity theory
computation complexity
computational complexity
Control Theory
Decoding
decoding algorithms
encoding
Image coding
information security
LSB substitution
mobile devices
PCDH
personal privacy
PSNR
PSNR-controllable data hiding algorithm
pubcrawl170107
Resiliency
Resistance
security
sensors
steganalysis
Steganography
biblio
An effective information filtering method based on the LTE network
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
4G LTE high-speed network
4G LTE network
4G mobile communication
AdaBoost
Bayes methods
Bayesian classification
Classification algorithms
content-based filter
content-based information filtering
data analysis
filtering algorithms
filtering theory
five-tuple filter
four-level content-based information filtering
information filtering
information filtering method
Information filters
information technology
KNN (Key Nearest Neighbor)
learning (artificial intelligence)
Long Term Evolution
LTE
LTE network
minimum-risk Bayesian classification
mobile computing
nearest neighbor text classification
network security
pubcrawl170107
pubcrawl170108
Training
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
Access Control
access violation
Algorithm design and analysis
Cloud Computing
data access
Decision Making
detection algorithm
detection algorithms
formal representation
Frequency modulation
global flow diagram
global flow graph
graph theory
legitimacy detection
multilevel hybrid cloud algorithm
pubcrawl170107
pubcrawl170108
security of data
unauthorized access
unauthorized access risks
Virtual machining
biblio
Privacy on hypothesis testing in smart grids
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
asymptotic exponential decay rate minimization
consumer behaviour
data privacy
energy provider
energy source
Energy storage
energy storage device
energy supply
error statistics
minimum type II error probability
optimal control
optimal energy control strategy
power control
power system control
power system security
privacy
privacy information leakage
privacy risk suppression
pubcrawl170107
pubcrawl170108
Smart Grids
smart meter
smart meters
smart power grids
testing
unauthorized binary hypothesis testing
Yttrium
biblio
Mapping of Dengue Outbreak Distribution Using Spatial Statistics and Geographical Information System
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
Aedes mosquito-borne disease
ANN
Artificial Neural Networks
average nearest neighbor
buffer analysis
data analysis
dengue fever outbreak distribution
diseases
estimation
estimation theory
geographic information systems
geographical information system
GIS
KDE
Kernel
kernel density estimation
pattern classification
pubcrawl170107
pubcrawl170108
risk analysis
risk map
Rivers
spatial statistics
Urban areas
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
attack graph generation methods
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
distributed schema
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
interdependencies modelling
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
risk management
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
biblio
Defending mechanisms for protecting power systems against intelligent attacks
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
defending mechanisms
game theory
Games
generalized game models
intelligent attacks
Load modeling
Nash Equilibrium
Numerical models
Power system protection
power system security
power systems
pubcrawl170107
pubcrawl170108
risk assessment
zero-sum game model
1
2
3
4
next ›
last »