Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
Fuzzy clustering of incomplete data based on missing attribute interval size
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
interval data set
TICI data set
standards
similar object cluster identification
pubcrawl170107
Prototypes
pattern clustering
nearest neighbor rule
missing attribute interval size
Iris
Interval size
interval median
Algorithm design and analysis
incomplete data clustering
Incomplete Data
fuzzy set theory
fuzzy clustering
fuzzy c-means algorithm
Fuzzy C-Means
data structures
data handling
Clustering algorithms
Breast
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
AHP, fuzzy sets and TOPSIS based reliable route selection for MANET
Submitted by BrandonB on Wed, 05/06/2015 - 9:03am
mobile ad-hoc network
triangular fuzzy numbers
TOPSIS based reliable route selection
TOPSIS
telecommunication security
telecommunication network routing
technique-for-order performance-by-similarity-to-ideal solution
source node
Routing protocols
Routing
Pragmatics
number theory
multiple route ranking
AHP
mobile ad hoc networks
MCDM
MANET
linguistic values
Fuzzy sets
fuzzy set theory
Fuzzy logic
destination node
criteria weights
analytical hierarchy process
analytic hierarchy process
AHP based reliable route selection
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile ad hoc network security
trust-based multicast routing protocol
trust model
telecommunication security
Routing protocols
network trust dynamic adaptability
network interaction quality
multiple trust decision factor
multicast protocols
multi-agent systems
multi-agent system
mobile ad hoc networks
analytic hierarchy process
malicious node detection
information-theoretic framework
fuzzy theory
fuzzy set theory
Fuzzy logic
fuzzy analytic hierarchy process theory
FAPtrust
entropy weight method
decision-making
Decision Making
biblio
Vessel track correlation and association using fuzzy logic and Echo State Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
Recurrent neural networks
moving object tracking
naval engineering computing
Neural networks
object tracking
pattern clustering
Radar tracking
recurrent neural nets
recurrent neural network
Mathematical model
sensing modality
sensors
target tracking
Track Association
Track Correlation
Vectors
vessel track association
vessel track correlation
fuzzy k-nearest neighbours
computational-intelligence-based methods
Correlation
correlation methods
data fusion
Defence and Security
defense community
echo state networks
fuzzy c-means clustering
computational intelligence
Fuzzy logic
fuzzy set theory
Kalman filter
Kalman filters
Marine vehicles
Maritime Domain Awareness
maritime vessels
biblio
A New Intelligent Neuro #x2013;Fuzzy Paradigm for Energy-Efficient Homes
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
Home appliances
Table lookup
smart house
Smart Grids
Smart Grid
Pricing
power engineering computing
Neurons
Neural networks
neural nets
intelligent neuro-fuzzy paradigm
intelligent lookup table
intelligent EMS
iEMS
home automation
associative neural network
fuzzy subsystem
fuzzy set theory
fuzzy rules
Fuzzy logic
energy-efficient homes
energy management systems
energy management
Energy Efficiency
energy consumption
DR
Demand response (DR)
demand response
automated energy management systems
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Integrity Assessment Scheme for Situational Awareness in Utility Automation Systems
Submitted by BrandonB on Fri, 05/01/2015 - 7:41am
graph theory
utility automation systems
Unsupervised Learning
Switches
state estimation
situational awareness
power systems
power distribution control
partial internal failure
multiagent technology
Monitoring
interconnected devices
integrity assessment scheme
IEEE 34-bus test distribution system
human operators
graph-theoretic fuzzy cognitive maps
advanced automation systems
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
FCM
external damage
expert systems
event analysis
distributed intelligence
cognitive systems
Capacitors
automation system vulnerabilities
automation system
automation framework
automation
Artificial Intelligence
biblio
A Fuzzy Clustering-Based Credibility Model for Trust Assessment in a Service-Oriented Architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:53pm
human computer interaction
web services
Web Service
Trusted Computing
trust assessment
trust
Social network services
service-oriented architecture
Robustness
pattern clustering
majority rating
Clustering algorithms
fuzzy set theory
fuzzy clustering
Equations
customer satisfaction
credibility model
Credibility
consumer ratings
consumer credibility
Computational modeling
Communities
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »