Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Control Theory
biblio
Node Importance Evaluation Method for Cyberspace Security Risk Control
Submitted by grigby1 on Fri, 08/26/2022 - 2:07pm
Big Data
Node importance
Key nodes
cyber security knowledge graph
Cyber security data fusion
Control Theory
Cyberspace
education
Ontologies
security
Topology
Scalability
Correlation
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Asymptotically Stable Fault Tolerant Control for Nonlinear Systems Through Differential Game Theory
Submitted by grigby1 on Fri, 08/26/2022 - 2:07pm
Stability analysis
fault tolerant control
Differential Games
Differential game
asymptotically stable
Asymptotic stability
Adaptive dynamic programming
Control Theory
Reliability engineering
security
reliability theory
actuators
Neural networks
Scalability
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Security Decision Support in the Control Systems based on Graph Models
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
Complexity theory
technical systems
response against violations
graph
countermeasure model
Control Theory
control
decision support
countermeasures
forecasting
information security
control systems
Decision Making
Scalability
Resiliency
Human Factors
Human behavior
pubcrawl
security
biblio
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
security
pubcrawl
Human behavior
Human Factors
Resiliency
Indexes
Scalability
Ad hoc networks
Data processing
computational intelligence
Rough sets
Control Theory
effectiveness evaluation
mobile ad hoc networks
rough set theory
biblio
A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
cyber security risk assessment
security
Scalability
risk management
Resiliency
pubcrawl
Information systems
Human Factors
Human behavior
Security Risk Management
Control Theory
control systems
Computers
Computer crime
complex networks
complex network theory
Communication-Based Train Control
attack graph
biblio
Edge Differential Privacy for Algebraic Connectivity of Graphs
Submitted by grigby1 on Fri, 08/26/2022 - 12:27pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
privacy
Topology
network topology
simulation
social networking (online)
differential privacy
consensus protocol
Control Theory
biblio
Privacy-Preserving Stealthy Attack Detection in Multi-Agent Control Systems
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
privacy
control systems
Switches
Observers
numerical simulation
Control Theory
biblio
Minimizing Information Leakage of Abrupt Changes in Stochastic Systems
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
privacy
data privacy
Markov processes
Reinforcement learning
stochastic systems
numerical simulation
Control Theory
biblio
A Privacy-Preserving Incentive Mechanism for Federated Cloud-Edge Learning
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
Computational modeling
Cloud-edge computing
Incentive mechanism
Control Theory
federated learning
Learning systems
optimal control
differential privacy
Games
pubcrawl
data privacy
privacy
Data models
Scalability
Resiliency
resilience
Human behavior
biblio
Bipartite Consensus for Multi-Agent Systems with Differential Privacy Constraint
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
pubcrawl
Human behavior
resilience
Resiliency
Heuristic algorithms
Scalability
privacy
multi-agent systems
differential privacy
System performance
Control Theory
sufficient conditions
Antagonistic Information
Bipartite Consensus
Key Words: Multi-agent Systems
1
2
3
4
5
6
7
8
9
…
next ›
last »