Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy logic
biblio
Encryption of the Images on the Basis of Two Chaotic Systems with the Use of Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Fuzzy Cryptography
statistical analysis
Scalability
Resiliency
pubcrawl
pseudorandom sequences
Metrics
image encryption system
Image coding
fuzzy logic encryption
Fuzzy logic
security
Entropy
digital cryptography
Cryptography
correlation coefficient
Chaotic systems
Chaotic Mapping
chaotic map
chaotic encryption
chaotic cryptography
chaos
biblio
An Energy Efficient Security Aware Clustering approach using Fuzzy Logic for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:00pm
MANET
telecommunication security
telecommunication power management
SFLC
security-aware fuzzy-based clustering
security
resilience
pubcrawl
pattern clustering
network topology
mobile adhoc networks
mobile ad hoc networks
manet privacy
Fuzzy logic
energy efficient security aware clustering approach
energy conservation
Energy
computation time
clustering
cluster head selection
ad hoc network
Compositionality
Metrics
Resiliency
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
context-aware approach
trustworthiness inference framework
trust generation
trust elements
sociological principles
social networking
recommendation trust
psychological principles
kernel-based nonlinear multivariate grey prediction model
kernel-based nonlinear multivariate grey prediction
internal similarity trust
human behaviors
fuzzy logic method
familiarity trust
external similarity trust
context-aware trustworthiness inference framework
Internet of Things
Social Internet of Things
grey systems
psychology
Trust management
Predictive models
trustworthiness
Fuzzy logic
smart objects
direct trust
Reliability
social networking (online)
composability
pubcrawl
Trusted Computing
Protocols
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
The Model and Algorithm for Ensuring the Survivability of Control Systems of Dynamic Objects in Conditions of Uncertainty
Submitted by grigby1 on Fri, 06/26/2020 - 12:19pm
Control System
uncertainty conditions
survivability evaluation
Survivability
minimal control systems
fuzzy control
feedback
dynamic objects
dynamic object
pubcrawl
conditions of uncertainty
graph theory
cyber-physical systems
Fuzzy logic
Resiliency
Metrics
composability
biblio
A Machine Learning Approach for URL Based Web Phishing Using Fuzzy Logic as Classifier
Submitted by grigby1 on Fri, 04/10/2020 - 11:35am
learning (artificial intelligence)
Web sites
Web Mining
URL based Web phishing
Uniform resource locators
security of data
pubcrawl
phishing URL
phishing site
Phishing Detection
phishing attacks
Phishing
pattern classification
machine learning
classifier
internet
Human Factors
Human behavior
fuzzy logic classifier
Fuzzy logic
financial information
feature extraction
Databases
Data mining
credential information
Conferences
Computer crime
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »