Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
decision-making process
biblio
Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
Autonomous automobiles
camera frames
camera vulnerabilities
Cameras
car application
Decision Making
decision-making process
embedded cameras
environment discovery
existing security breaches
Human behavior
Human Factors
Image reconstruction
important fields
Intrusion Detection
mobile robots
policy-based governance
pubcrawl
resilience
Resiliency
robot cameras
Robot Operating System
robot operating systems
Robot vision systems
robust solutions
ROS
security
security of data
self-driving cars industry
spatio-temporal autoencoders
suspicious frames
telecommunication security
Training
unsupervised anomaly detection tool
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 1:02pm
security
pubcrawl
Decision Making
game theory
adversarial decision-making environment
complex dynamical systems of systems
complex systems
cooperative game theory
decision-making process
independent decision-making entities
interacting subsystems
Large-scale systems
noncooperative game theory
noninferior Nash strategies
opposing attacked subsystem
opposing subsystem
unified team making team-based decisions
Control Theory
biblio
Truth-Aware Optimal Decision-Making Framework with Driver Preferences for V2V Communications
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
Accidents
appropriate human preference factors
Bayes rule
collaboration
data trustworthiness
Decision Making
decision-making process
Dempster Shafer Theory
event belief
false data
false information
false trust
incorporate driver preferences
Intelligent Transportation System
Intelligent Transportation Systems
malicious actors
multiple-vehicle attack
optimal action
policy-based governance
pubcrawl
reported road events
resilience
Resiliency
Roads
Safety
Scalability
sensors
trust-aware decision-making framework
Trusted Computing
truth-aware optimal decision-making framework
utility maximization framework
V2V communications
vehicle-to-vehicle communications
vehicles
vehicular ad hoc networks
vehicular traffic stream
verifiable transmitter
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
available service providers
Cloud Computing
Computational modeling
computer centres
computing servers
Decision Making
decision-making process
edge computing
enhanced heterogeneity
Fog computing
FOG computing environment
Heuristic algorithms
Indexes
Internet of Things
load balancing
online Internet of Things services
optimal datacenter
personal computers
pubcrawl
quantized security
Resiliency
resource allocation
SbSBP
Scalability
security
security of data
security risks
security strength
security-based service broker policy
Service Broker
Time factors
Trust models
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
attack-surface
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
correlating network data
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
decision-making process
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
Resiliency
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics