Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern clustering
biblio
An Energy Efficient Security Aware Clustering approach using Fuzzy Logic for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:00pm
MANET
telecommunication security
telecommunication power management
SFLC
security-aware fuzzy-based clustering
security
resilience
pubcrawl
pattern clustering
network topology
mobile adhoc networks
mobile ad hoc networks
manet privacy
Fuzzy logic
energy efficient security aware clustering approach
energy conservation
Energy
computation time
clustering
cluster head selection
ad hoc network
Compositionality
Metrics
Resiliency
biblio
A Study of Big Data Security on a Partitional Clustering Algorithm with Perturbation Technique
Submitted by grigby1 on Mon, 12/28/2020 - 11:40am
parallel processing
security of data
security
Scalability
Resiliency
resilience
pubcrawl
privacy preserving
principal component analysis
Precision
perturbation technique
Perturbation methods
PCA
pattern clustering
Partitioning algorithms
partitional clustering algorithm
Accuracy
Metrics
Human behavior
HDFS
Hadoop distributed file system
F-Socre Measure
execution time
Distributed databases
data privacy
Conferences
Clustering Tme
Clustering algorithms
big data security
big data privacy
Big Data
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
Malware Analysis
Unsupervised Learning
supervised learning
SRA
smart phones
similarity relationships
Semantics
security
Resiliency
resilience
pubcrawl
privacy
pattern clustering
pattern classification
Metrics
malware link network
analytical workload
malware
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding techniques
graph embedding
GefDroid
feature extraction
familial analysis
Face
detection algorithms
application program interfaces
Android malware
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
biblio
Research of Personalized Recommendation Algorithm Based on Trust and User's Interest
Submitted by grigby1 on Tue, 12/01/2020 - 12:36pm
pubcrawl
Videos
user interest
trustworthyness model
Trusted Computing
trust similarity
trust
sparse subspace clust algorithm
social networking (online)
robust trust
Robot Trust
Resiliency
resilience
recommender systems
Accuracy
Prediction algorithms
personalized recommendation algorithm
pattern clustering
online video site
Motion pictures
joint interest-content recommendation
Human Factors
Human behavior
History
filtering algorithms
collaboration
Clustering algorithms
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
reliable Bee clustering routing protocol
mobile ad hoc network
mobile ad hoc networks
multihop routing
packet forwarding ratio
packet forwarding statistics
pattern clustering
pubcrawl
public key cryptography
received packets
Metrics
reliable data transmission
resilience
Resiliency
Routing
Routing protocols
secure data delivery system
sensors
telecommunication security
wireless sensor networks
ECC
Bee Ad Hoc Clustering
bee clustering approach
Bee-Ad Hoc-C
Black hole attack
clustered based approach
Compositionality
data confidential
data privacy
data reliability
overhearing
Elliptic curve cryptography
Elliptical Curve Cryptography
Energy Efficiency
ensures data confidentiality
forwarded packets
IndexTerms-Mobile Ad Hoc Networks
legion intelligence
MANET
manet privacy
biblio
Local Outlier Factor Based False Data Detection in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
Smart Grids
local outlier factor
false data attack
electric power delivery
dummy data attack
density-clustering based LOF algorithm
density clustering
cyber attackers
False Data Detection
cyber physical systems
pattern clustering
security of data
power systems
power grids
composability
smart power grids
power engineering computing
Resiliency
resilience
Human behavior
pubcrawl
Anomaly Detection
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 2:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »