Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Threshold Based Optimization of Performance Metrics with Severely Imbalanced Big Security Data
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
learning (artificial intelligence)
threshold based optimization
Slow HTTP POST
severely imbalanced slow HTTP DoS attack data
severely imbalanced big security data
security of data
pubcrawl
predictive security metrics
Performance Metrics
pattern classification
optimisation
Metrics
machine learning techniques
big data security metrics
imbalanced big dataset
Decision trees
cyber security domain
classifier predictive models
classifier performance
classification threshold
class imbalance
C4.5N decision tree
Big Data
AUC
area under the receiver operating characteristic curve
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Adaptive Network Management for Safety-Critical Systems
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
Bandwidth
predictability
Security Heuristics
Safety-Critical Systems
optimization algorithm
fault diagnosis
Dijkstra algorithm
complex network configurations
adaptive network management
Device-to-device communication
computer network reliability
timing
Safety
resilience
security
software-defined networking
telecommunication network routing
optimisation
optimization
Routing
pubcrawl
Resiliency
software defined networking
computer network management
telecommunication traffic
Scalability
computer network security
biblio
An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
optimisation
time-varying systems
time-varying system matrices
time-varying dynamics
system parameters
system estimation performance
sensors
Scalability
Resiliency
resilience
pubcrawl
actuators
optimal design
moving target defense
Metrics
matrix algebra
integrity attacks
control system security
control systems
Attack detection
adaptive attack strategy
biblio
White-Box Atomic Multicast
Submitted by grigby1 on Tue, 02/18/2020 - 11:53am
genuine atomic multicast protocol
white-box optimisations
white-box atomic multicast
white box cryptography
Resiliency
resilience
replication
pubcrawl
optimisation
multicast protocols
Metrics
message delays
Atomic multicast
Fault tolerant systems
fault tolerance
destination processes
destination groups
delays
Concurrency
composability
Clocks
classical Skeen's multicast protocol
atomic multicast needs
biblio
Self-Healing in Distribution Grids Supported by Photovoltaic Dispersed Generation in a Voltage Regulation Perspective
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
self-healing
power system CAD
power system control
PSCAD
pubcrawl
reactive power control
reactive power injection control
resilience
Resiliency
power grids
self-healing action
self-healing networks
sensitivity analysis
Smart Grids
telecommunication network
Voltage control
voltage regulation
optimisation
comprehensive architecture model
dispersed generation sources
distributed generation photovoltaic systems -DGPV
distributed power generation
distribution feeder
electronic inverters
invertors
MATLAB
composability
optimization method
photovoltaic dispersed generation
photovoltaic power systems
power distribution control
power distribution faults
power distribution grid
power generation control
biblio
An Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using Optimal Cooperative Range
Submitted by grigby1 on Mon, 02/17/2020 - 5:11pm
Resiliency
Microprocessors
network parameters
noise power
optimal cooperative range
optimisation
path-loss exponent
pubcrawl
Rayleigh channels
resilience
MBS
self-healing
self-healing het nets
self-healing networks
Shadow mapping
shadowing fading factor
telecommunication network reliability
transmission power
Wireless communications
fault detection
Cell Outage Detection
composability
computer architecture
Cooperation Range
cooperative COD
cooperative communication
detection accuracy maximization
detection delay
Fading
Anomaly Detection
fault diagnosis
FBS
femtobase stations
femtocellular radio
heterogeneous networks
Heuristic algorithms
improved cooperative cell outage detection
macrobase station
biblio
Emergency Severity Assessment Method for Cluster Supply Chain Based on Cloud Fuzzy Clustering Algorithm
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
Scalability
Metrics
multidata fusion method
optimisation
pattern clustering
policy-based governance
pubcrawl
resilience
Resiliency
Risk Severity Assessment
Human Factors
sensor fusion
sliding window model
summary cloud model generation algorithm
Sun mary Cloud Model Generation Algorithm
supply chain risk assessment
synopsis data
time attenuation model
Voltage control
composite uncertainty characteristics
cloud fuzzy clustering algorithm
cloud model processing
cluster centers
cluster microcluster weights
Cluster Supply Chain
cluster supply chain emergency
collaboration
composability
Cloud Computing
data stream fuzzy clustering algorithm
emergency management
Emergency Risk
emergency severity assessment indexes
emergency severity assessment method
fuzzy set theory
high-dimensional data stream characteristics
Human behavior
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »