Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
policy documents
time division multiplexing
Text Mining
text analysis
state owned capital layout adjustment
soft computing method
Semantics
Security Policies Analysis
pubcrawl
policy-based governance
policy text analysis
policy elements
causal relationships
partial association test
natural language processing
Layout
latent semantic analysis
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
fuzzy association rule mining
FARM
Data models
Data mining
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Enhancing Smart Grid Cyber-Security Using A Fuzzy Adaptive Autonomy Expert System
Submitted by aekwall on Mon, 10/12/2020 - 11:36am
power system security
Human automation interaction
Human behavior
human computer interaction
information technology
leave-one-out cross-validation
level of automation
performance shaping factors
power engineering computing
gradient methods
pubcrawl
Resiliency
Scalability
security of data
smart grid cybersecurity
Smart Grids
smart power grids
expert systems
Adaptive Autonomy
adaptive systems
automation
Complexity theory
Computer crime
cyber security
environmental conditions
expert system database
False Data Detection
Expert Systems and Security
fuzzy adaptive autonomy expert system
fuzzy expert system
fuzzy rule
fuzzy set theory
fuzzy systems
gradient descent algorithm
biblio
Development of Models in Resilient Computing
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resistance
parallel processing
Perturbation methods
perturbations
problem solving
pubcrawl
resilience
Resiliency
resilient computing
modelling
resistive computing
resistivity
resource boundaries
resource niche
reversible and irreversible processes
reversible development processes
smarter elasticity
elastic computing
checkability
Circuit faults
computational checkability
Computational modeling
computing development
computing evolution factors
Computing Theory
critical applications
Biological system modeling
elasticity
evolutionary computation
evolutionary development
fuzzy set theory
growth challenge
harsh resistance
irreversible development processes
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
Public key
Computing Theory and Privacy
Proxy Re Encryption
nonnegligible privacy issues
medical documents
identity based encryption
Health Information Systems
fuzzy conditional identity-based proxy re-encryption
FCI-PRE
electronic medical records
data-intensive domain
cloud-based health information system
healthcare providers
health care
Cloud Computing
fuzzy set theory
privacy
pubcrawl
Human behavior
Resiliency
Medical services
electronic health records
data privacy
Access Control
encryption
Cryptography
Scalability
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
Fuzzy-GRA Trust Model for Cloud Risk Management
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
gray relational theory
Trusted Computing
trust model
Software
security vulnerabilities
security of data
security
risk management
pubcrawl
Peer-to-peer computing
Mathematical model
local trust model
grey systems
Adaptation models
gray relational analysis
global trust model
Fuzzy-GRA trust model
fuzzy set theory
fuzzy mathematics
Computer Theory and Trust
Computational modeling
Compositionality
composability
cloud safety
cloud risk management
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »