Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
Fingerprint recognition
Servers
Scalability
Resiliency
resilience
pubcrawl
Metrics
IoT security
IoT securing system
IoT features
Internet of Things
fuzzy set theory
fuzzy commitment scheme
fuzzy commitment
FRR criteria
authentication
fingerprint identification
feature extraction
FAR criteria
error-corrector codes
encryption system
encryption
discrete cosine transforms
DCT-based recognition method
DCT-based fingerprint recognition
DCT
Databases
Cryptography
computer network security
biometric encryption
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
internet
Web software trustworthiness measurement
web software
trustworthiness
Trusted Computing
security of data
pubcrawl
online accounting software
matrix algebra
Manganese
ISO/IEC 9126
ISO standards
automation
IEC standards
fuzzy set theory
fuzzy judgment matrix
factor analysis
evidence theory
evidence synthesis
Entropy
empirical analysis
confidence identification
composability
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
Crawling and cluster hidden web using crawler framework and fuzzy-KNN
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
pattern classification
Web site level
Web crawling
search process
hidden Web clustering
hidden web
fuzzy-KNN method
fuzzy-KNN
database classification process
crawling framework
crawler framework
fuzzy set theory
Browsers
pubcrawl
database management systems
World Wide Web
Databases
search engines
Crawlers
Web sites
Weapons
internet
dark web
deep web
Human Factors
Human behavior
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
Research of Security Risk in Electric Power Information Network
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
power engineering computing
synthesis evaluation model
styling
security weaknesses
security risk
security of data
Security Evaluation
risk management
risk assess
Resiliency
resilience
pubcrawl
Production
power systems
power system management
collaboration
policy-based governance
password
operating systems
network security
multilevel fuzzy comprehensive judgment
Metrics
Human Factors
Human behavior
fuzzy set theory
fuzzy judgment
evaluation index system
electric power information network
Communication networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »