Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multiagent system
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
A Multi-Agent Model for Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 10:18am
Anomaly Detection
network requirements
network intrusions
Multi Agent System
MAS agents
Hadoop distributed file system
distribution
distributed intrusion detection model
DIDS
Big networks
big computer infrastructure
multiagent system
autonomy
Intrusion Detection
computer network security
computer security
MAS
Databases
network intrusion detection
multi-agent systems
Metrics
composability
pubcrawl
Resiliency
security
Big Data
IDS
biblio
Energy Management in an Islanded Microgrid: A Consensus Theory Approach
Submitted by aekwall on Mon, 01/20/2020 - 10:46am
lambda-iteration method
transmission losses
scalability test
Resiliency
renewables
renewable energy sources
renewable energy
pubcrawl
Propagation losses
optimization problem
optimization
optimisation
multiagent system
multi-agent systems
Microgrids
micro grid.
8-bus islanded microgrid
Iterative methods
Generators
expandability performance
expandability
energy management systems
energy management optimization algorithm
energy management
Economics
distributed power generation
distributed generation
DG energy managemen
consensus theory approach
Consensus
composability
biblio
Secured aerial photography using Homomorphic Encryption
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
image encryption
Servers
server
Scientific Computing Security
Resiliency
public key cryptosystem
public key cryptography
pubcrawl
photography
NTRU
multiagent system
Metrics
Image quality
aerial photography
image capture
Homomorphic encryption
encryption
drones
Drone
concatenation
Compositionality
Cloud Computing
cloud
Amazon EC2 cloud server
aerial photography security
biblio
Adaptive Subpixel Mapping Based on a Multiagent System for Remote-Sensing Imagery
Submitted by BrandonB on Mon, 05/04/2015 - 1:27pm
spatial attraction model
mixed pixel structure reconstruction
multi-agent systems
multiagent subpixel mapping framework
multiagent system
neural nets
remote sensing
remote-sensing image classification
remote-sensing imagery
soft classification
mixed pixel problem
spectral unmixing techniques
subpixel mapping accuracy
subpixel mapping agents
subpixel mapping algorithm performance
subpixel mapping problem
subpixel spatial attribution
synthetic remote-sensing images
traditional subpixel mapping algorithms
decision agents
adaptive subpixel mapping technique
Algorithm design and analysis
artificial images
back-propagation neural network
boundary-mixed pixel
class abundance
class labels
coarser spectrally unmixed fraction images
adaptive subpixel mapping framework
feature detection agent kinds
feature extraction
fine-resolution map
geophysical image processing
hard classification method
identical mixed pixel type
image classification
linear subpixel
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 10:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection