Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
Hybrid bilateral filter
Submitted by grigby1 on Wed, 03/08/2017 - 2:05pm
Image color analysis
spatial parameter
pubcrawl170111
Pragmatics
photometric weight
photometric parameter
Measurement
Mathematical model
image noise reduction
image filtering
image filter
Image edge detection
image denoising
image colour analysis
bilateral filter
hybrid bilateral filter
geometric weight
Fuzzy similarity
fuzzy set theory
fuzzy rule
fuzzy metrics
Fuzzy metric
fuzzy bilateral filter
Colored noise
color component
Color
bilateral image filter
biblio
Fuzzy Optimization of Automobile Supply Chain Network of Considering Risks
Submitted by grigby1 on Wed, 03/08/2017 - 1:56pm
fuzzy price
transportation costs
total profit risk minimization
supply chains
supply chain network
supply chain management
risks
risk management
pubcrawl170110
profitability
Pricing
optimization
optimisation
Industries
fuzzy set theory
Approximation methods
fuzzy optimization
Fuzzy
distribution centers
discretization points
discrete fuzzy problem
Cplex 12.6
continuous fuzzy problem
component suppliers
component plants
automotive components
automobiles
automobile supply chain network
automobile
biblio
Multi-objective dynamic unit commitment optimization for energy-saving and emission reduction with wind power
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
satisfaction-maximizing decision
NSGA-D
NSGA-II algorithm
optimization
Pareto optimisation
Pareto solution
pollution emission
power generation dispatch
power generation scheduling
pubcrawl170110
nondominated sorting genetic algorithm-II
SO2
Spinning
sulphur compounds
unit commitment optimization
Wind power generation
wind power integrated system
wind power plants
Wind speed
wind turbines
fuzzy satisfaction-maximizing method
carbon compounds
CO2
commitment discrete magnitude
double optimization
double-optimization strategy
emission reduction
energy-saving
energy-saving and emission reducing
fault time
air pollution
fuzzy set theory
genetic algorithms
Heuristic algorithms
Linear programming
load distribution
mixed-integer variable
multi-objective
multiobjective dynamic unit commitment optimization
multiobjective unit commitment modeling
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Code based community network for identifying low risk community
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
pubcrawl170107
vehicle routing
travelling
Time
security
Safety
safe routing
Routing
road traffic
road safety
road network
risk factor
pubcrawl170108
balancing conundrum
low risk community
low risk cities
Inference algorithms
fuzzy technique
fuzzy set theory
Fuzzy inference process
distance
cost
code based community network
Code based Community
Cities and towns
boulevard network centers
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »