Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
uncertainty handling
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 1:42pm
information fusion
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
Damage Assessment
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
pubcrawl
uncertainty handling
underwater acoustic communication
Sensitivity
marine communication
threat assessment
uncertainty
probability
inference mechanisms
Cost accounting
cognition
Artificial Intelligence
sensor fusion
telecommunication security
Resiliency
resilience
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
parallel optimization algorithm
asynchronous parameter optimization
black-box function optimization
ensemble surrogating model
model integration mode
parallel computing
parallel computing framework
parallel computing resources
parallel computing technology
asynchronous parallel surrogate optimization algorithm
parallel parameter space sampling mechanism
parallel sampling mechanism
Quantitative Trading
response surface methodology
stochastic response surface method
surrogate model-based optimization algorithm
Stochastic Computing Security
Adaptation models
uncertainty handling
parallel algorithms
approximation theory
inference mechanisms
ensemble model
optimisation
Load modeling
Stochastic processes
Computational modeling
Scalability
optimization
Resiliency
resilience
pubcrawl
Predictive models
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
inference mechanisms
uncertainty handling
telecommunication computing
sensors
security of data
Safety
Resiliency
Reliability
pubcrawl
local IDS agent
local detection decisions
Intrusion Detection
Base stations
IDS Agent
distributed intrusion detection system
Dempster-Shafer's evidence theory
Dempster-Shafer evidence theory
Data collection
D-S evidence theory
CRN
cooperative detection center
Cognitive Radio Security
cognitive radio networks
cognitive radio
biblio
A Collective, Probabilistic Approach to Schema Mapping
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
uncertainty handling
schema mapping optimization problem
Scalability
Resiliency
pubcrawl
probability
probabilistic reasoning techniques
probabilistic reasoning
Probabilistic logic
optimization
metadata-only approaches
Metadata Discovery Problem
metadata constraints
CMD
meta data
mapping selection
inference mechanisms
data structures
Data mining
Data engineering
Conferences
Compositionality
Companies
collective probabilistic schema mapping approach
collective mapping discovery
cognition
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
A novel trust evaluation method for Ubiquitous Healthcare based on cloud computational theory
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
Pragmatics
user profile attributes
uncertainty handling
uncertain reasoning
UH environment
ubiquitous healthcare
ubiquitous computing
TV
Trusted Computing
trust evaluation method
cloud computational theory
MIMICs
Medical services
MATLAB software
MATLAB
health care
Generators
Conferences
cloud theory
Cloud Computing