Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
game theory
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by
aekwall
on Mon, 12/21/2020 - 12:34pm
security
Trusted Computing
game theory
cyber-physical systems
pubcrawl
composability
Peer-to-peer computing
trust
Mathematical model
trustworthiness
security threats
information and communication technology
Games
sensors
Nash Equilibrium
game-theoretic approach
ICT
secure operation
CPS sensor nodes
information and communication technologies
biblio
Synthesizing Secure Reactive Controller for Unmanned Aerial System
Submitted by
grigby1
on Thu, 12/17/2020 - 1:02pm
autonomous aerial vehicles
buffer-overflow
complex CPS
control engineering computing
game theory
GPS spoofing
Human behavior
Human Factors
Linear Temporal Logic
LTLMoP platform
malicious attacks
multi-robot systems
multirobots system
packets injection
Path Planning
policy-based governance
pubcrawl
reactive synthesis
resilience
Resiliency
robot operating systems
secure controller
secure reactive controller synthesis
security
security of data
Temporal Logic
two-player game process
UAS attack scenarios
UAS vulnerability
unmanned aerial system
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by
aekwall
on Mon, 12/14/2020 - 11:32am
Receivers
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
wireless channels
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
channel surfing
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by
grigby1
on Wed, 12/02/2020 - 1:15pm
adequate transparency
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
cryptographic regulation protocols
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
Games
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
secure B2B collaboration
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
biblio
Robust Nash Static Output Feedback Strategy for Uncertain Markov Jump Delay Stochastic Systems
Submitted by
grigby1
on Wed, 12/02/2020 - 1:02pm
active queue management
algebraic equations
Congestion Control
coupled congestion control
cross coupled stochastic matrix inequalities
delay systems
delays
feedback
game theory
linear matrix inequalities
Markov processes
microsoft windows
Output feedback
pubcrawl
resilience
Resiliency
robust control
robust Nash static output feedback strategy
Robustness
Scalability
stochastic systems
uncertain Markov jump delay stochastic systems
uncertain systems
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by
grigby1
on Tue, 12/01/2020 - 3:37pm
Bandwidth
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
efficient bandwidth pricing algorithm
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
Internet-scale applications
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Resiliency
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
biblio
Robots that Take Advantage of Human Trust
Submitted by
grigby1
on Tue, 12/01/2020 - 12:24pm
communicative robot behavior
game theory
Human behavior
Human Factors
human trust
human-robot interaction
intelligent robots
learning (artificial intelligence)
mobile robots
optimal actions
optimisation
pubcrawl
rational-intelligent robots
resilience
Resiliency
robot actions
Robot Trust
robust trust
uncertain human
biblio
“I Don't Believe You”: Investigating the Effects of Robot Trust Violation and Repair
Submitted by
grigby1
on Tue, 12/01/2020 - 12:23pm
Aerospace electronics
competitive game
finance
game theory
Games
Human behavior
Human Factors
human-robot interaction
human-to-robot promises
maintenance engineering
pubcrawl
resilience
Resiliency
robot repair
Robot Trust
robot trust violation
robots
robust trust
Solar system
trust
Trust Repair
trust repair strategy choice
trust violation framing
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by
aekwall
on Mon, 11/23/2020 - 10:28am
security of data
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
Resiliency
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
medical information systems
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
data miners
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
biblio
Misinformation Control in the Internet of Battlefield Things: A Multiclass Mean-Field Game
Submitted by
grigby1
on Tue, 11/17/2020 - 2:00pm
Computational modeling
considered model
convergence
Curing
false information
finite IoBT case
forward backward sweep method
game theory
Games
Human Factors
infection cost
Internet of Battlefield Things system
Internet of Things
iobt
IoBT node
massive heterogeneous IoBT system
mean-field equilibrium
Mean-field game
military computing
misinformation attack
misinformation control
misinformation propagation
multiclass agents
optimal probability
optimisation
probability
pubcrawl
QoI
quality of information
resilience
Resiliency
Scalability
Steady-state
telecommunication control
1
2
3
4
5
6
7
8
9
…
next ›
last »