Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory
biblio
Security Risk Assessment of Multimodal Transport Network Based on WBS-RBS and PFWA Operator
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
personnel risk
work breakdown structure (WBS)
WBS-RBS
waterway transportation
security risk factors
security risk assessment method
risk matrix 0-1 assignment
risk breakdown structure(RBS)
railways
railway-highway-waterway intermodal transportation process
railway transportation
Rail transportation
Pythagorean fuzzy weighted average(PFWA) operator
Pythagorean fuzzy weighted average operator
Pythagorean fuzzy number
PFWA operator
security
Personnel
multimodal transport network
multimodal transport
highway transportation
automotive components
security risk assessment
Security Risk Management
Transportation
fuzzy set theory
risk management
Metrics
pubcrawl
Resiliency
Scalability
Safety
biblio
Emergency Severity Assessment Method for Cluster Supply Chain Based on Cloud Fuzzy Clustering Algorithm
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
Scalability
Metrics
multidata fusion method
optimisation
pattern clustering
policy-based governance
pubcrawl
resilience
Resiliency
Risk Severity Assessment
Human Factors
sensor fusion
sliding window model
summary cloud model generation algorithm
Sun mary Cloud Model Generation Algorithm
supply chain risk assessment
synopsis data
time attenuation model
Voltage control
composite uncertainty characteristics
cloud fuzzy clustering algorithm
cloud model processing
cluster centers
cluster microcluster weights
Cluster Supply Chain
cluster supply chain emergency
collaboration
composability
Cloud Computing
data stream fuzzy clustering algorithm
emergency management
Emergency Risk
emergency severity assessment indexes
emergency severity assessment method
fuzzy set theory
high-dimensional data stream characteristics
Human behavior
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
biblio
A Swarm Intelligence Approach to Avoid Local Optima in Fuzzy C-Means Clustering
Submitted by aekwall on Mon, 01/27/2020 - 10:25am
pattern clustering
swarm intelligence global optimization method
optimization process
NP-hard
inter-cluster similarity
hill climbing method
fuzzy self-tuning particle swarm optimization
fuzzy clustering task
fuzzy c-means clustering
FST-PSO
clustering analysis
Linear programming
Compositionality
Partitioning algorithms
Task Analysis
computational complexity
fuzzy set theory
Fuzzy logic
Clustering algorithms
particle swarm optimization algorithm
particle swarm optimization
optimization
Swarm Intelligence
particle swarm optimisation
convergence
composability
pubcrawl
biblio
The Use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
passive barrier elements
tools
testing
socio-economic effects
socio-economic development
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
protection
physical protection system
passive barriers
data analysis
method
Mechanical factors
mechanical barriers
Human behavior
fuzzy set theory
expert systems
expert judgement
expert
delays
delay time values
delay time
Decision Making
Databases
biblio
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
service request
preference learning
Processor scheduling
QoS provision
quality of service provision
scheduling
serious security risks
service brokers
service composition
multiagent platform JADE
three-layered trust-enabled service composition model
transaction success rate
trust-based agent learning model
user experience
user experiences
user preference learning
user satisfaction
Computing Theory and Trust
Trust management
Task Analysis
Trusted Computing
mobile computing
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
multi-agent systems
Cloud Computing
fuzzy set theory
quality of service
mobile cloud computing
Compositionality
customers service preferences
fuzzy comprehensive evaluation method
mobile cloud computing environments
multi-agent technology
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
Decoding of Mind-Generated Pattern Locks for Security Checking Using Type-2 Fuzzy Classifier
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
resilience
Human Factors
Interval Type-2 Fuzzy Classifier
mind-generated pattern locks
neurological disorder
neuromuscular disability
P300 signals
pattern locks
pubcrawl
human factor
Resiliency
Scalability
security
security checking
signal classification
Training
type-2 fuzzy classifier
electroencephalography
BCI paradigm
BCI system
biometric security option
biometrics (access control)
brain-computer interface system
brain-computer interfaces
Decoding of Pattern Locks
electroencephalogram signals
Band-pass filters
Event RelatedPotentials
feature extraction
Firing
fuzzy set theory
Fuzzy sets
handicapped aids
Human behavior
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »