Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy logic
biblio
KNN-Fuzzy Classification for Cloud Service Selection
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
classification
cloud service
Data mining
Fuzzy logic
fuzzy membership
k-nearest neighbor
Metrics
pubcrawl
resilience
Resiliency
security
biblio
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Anomaly Detection
cyber-physical systems
Fuzzy logic
fuzzy logical inference
Metrics
network traffic analysis
pubcrawl
resilience
Resiliency
security
security risk analysis
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
Web sites
unsolicited e-mail
Uniform resource locators
security of data
security
Resiliency
resilience
pubcrawl
phishing sites
Phishing Detection
phishing attacks
Phishing
pagerank
online banking passwords
bank account details
Membership functions
malicious website
legitimate websites
indexing
global security
Fuzzy logic
fraudulent websites
Fraudulent
Electronic mail
Defuzzification
Data mining
Computer crime
Classification algorithms
Bars
biblio
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
trust model
Trust Management.
TCP SYN flooding attacks
security of data
security mechanisms
security
Resiliency
resilience
Receivers
pubcrawl
packet dropping attacks
Anomaly Detection
intrusion detection system
Intrusion Detection
Fuzzy logic
distributed denial of service attacks
distributed denial of service
denial-of-service attack
denial of service
counter-security issues
computer resources
Computer crime
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
Trust-aware routing protocol for mobile crowdsensing environments
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
sensor lifetime
MCS
Measurement
mobile crowdsensing environments
multi-metric decision
network lifetime
optimal routing decision
packet delivery ratio
residual energy
link quality node selection
Signal to noise ratio
sink node
social behaviour
suboptimal data forwarding
Trust management
trust-aware routing protocol
Trust Routing
Scalability
link quality
Fuzzy logic
friendship mechanism
FR solution
Energy Efficiency
telecommunication power management
Routing
energy conservation
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
mobile computing
Conferences
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 5:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
biblio
A new approach to dynamical system's fuzzy controller synthesis: Application of the unstable subsystem
Submitted by grigby1 on Fri, 09/28/2018 - 3:19pm
output signal
unstable subsystem
Transient analysis
system tuning
system output
Switches
standards
smooth transient
Resiliency
resilience
pubcrawl
composability
optimal control
nonlinear systems
Metrics
Fuzzy logic
fuzzy control
Dynamical Systems
dynamical system fuzzy controller synthesis
dynamical system
conditionally unstable fuzzy controller
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »