Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy logic
biblio
Adaptive Neuro-fuzzy System (ANFIS) of Information Interaction in Industrial Internet of Things Networks Taking into Account Load Balancing
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
Inference algorithms
information interaction
Internet of Thing
Resiliency
Fuzzy logic
Wireless Sensor Network
Sensor Systems
Clustering algorithms
neural network
adaptive systems
Load management
load balancing
wireless sensor networks
resilience
Metrics
pubcrawl
security
biblio
Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
regression analysis
multiple regression
cross-correlation
confidence interval
information resources
Costs
Resiliency
Risk
threat
Predictive models
Fuzzy logic
Analytical models
resilience
Metrics
pubcrawl
security
information security
biblio
Fuzzy Logic Data Protection Management
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
information security
security
pubcrawl
Metrics
resilience
Decision Making
computer security
Inference algorithms
Technological innovation
Fuzzy logic
Data protection
Resiliency
biblio
An Approach to Identifying the Type of Uncertainty of Initial Information Based on the Theory of Fuzzy Logic
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
security
pubcrawl
Metrics
resilience
uncertainty
Fuzzy logic
measurement uncertainty
Resiliency
Area measurement
membership function
uncertainty of information
biblio
Supply Chain Risk Assessment Using Fuzzy Logic
Submitted by grigby1 on Fri, 09/09/2022 - 3:59pm
tools
pubcrawl
Metrics
Industries
Companies
Nonhomogeneous media
supply chains
Fuzzy logic
risk management
supply chain management
Supplier Selection
supply chain risk assessment
biblio
Fuzzy ontology-based complex and uncertain video surveillance events recognition
Submitted by grigby1 on Tue, 05/10/2022 - 3:33pm
security
Fuzzy logic
fuzzy owl2
Human behavior
Metrics
Ontologies
pubcrawl
resilience
Resiliency
Semantic Web
Semantics
uncertainty
uncertainty Introduction.
video surveillance
video surveillance ontology
visualization
biblio
A Novel Authentication Mechanism for Securing Underwater Wireless Sensors from Sybil Attack
Submitted by grigby1 on Wed, 03/23/2022 - 11:35am
WSN
UWSN
Underwater Sensor Network
SN
PER
ECR
fuzzy system
underwater communication
sybil attacks
PDR
Fuzzy logic
security
Metrics
energy resources
Routing
composability
Wireless communication
wireless sensor networks
authentication
Resiliency
resilience
pubcrawl
biblio
Fuzzy Integration of Kernel-Based Gaussian Processes Applied to Anomaly Detection in Nuclear Security
Submitted by grigby1 on Mon, 01/10/2022 - 4:57pm
Kernels
uncertainty
tools
security
Resiliency
resilience
pubcrawl
Predictive models
nuclear security
Metrics
Anomaly Detection
Human behavior
Gaussian processes
Gaussian process
Fuzzy logic
Fuzzy integration
composability
artificial intelligence security
Artificial Intelligence
biblio
Generation of Textual Explanations in XAI: The Case of Semantic Annotation
Submitted by grigby1 on Wed, 12/22/2021 - 12:55pm
annotations
deep learning
explanation
fuzzy constraint satisfaction problems
Fuzzy logic
image segmentation
natural language generation
Natural languages
pubcrawl
resilience
Resiliency
Scalability
semantic annotation
Semantics
Vocabulary
xai
biblio
Detection of Zero-Day Attacks in Network IDS through High Performance Soft Computing
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
intrusion detection system
Zero day attacks
visualization
Soft Computing
Resiliency
resilience
pubcrawl
neural network
Metrics
composability
Intrusion Detection
Interference
High performance computing
Fuzzy logic
defense
Data Security
Data Breach
Computers
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »