Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
Hybrid Route Recommender System for Smarter Logistics
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
unmaintained roads
supply chain industry face
routing techniques
Roads
road surface conditions
pothole
poor road conditions
multiple recommendation techniques
hybrid route recommender system
content based filtering
hybrid
Accelerometers
road vehicles
recommender system
Human Factors
Transportation
fuzzy set theory
Decision Making
Logistics
Global Positioning System
collaborative filtering
pubcrawl
Resiliency
Scalability
biblio
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:26pm
organisational information systems
SSDEEP
threat actors
WannaCryptor
file organisation
codebase
k-means clustering
malware prevention strategy
mvHASH-B
SDHASH
ransomware corpus
ransomware detection method
ransomware samples
similarity detection success rate
similarity preserving hashing
similarity preserving hashing method
unknown ransomware variants
fuzzy set theory
invasive software
Resiliency
pubcrawl
composability
Ransomware
Metrics
organisational aspects
probability
Cryptography
Information systems
pattern clustering
ransomware attacks
WannaCry
Fuzzy Hashing
fuzzy hashing methods
fuzzy similarity scores
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »