Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rough set theory
biblio
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Submitted by grigby1 on Fri, 08/26/2022 - 3:06pm
security
pubcrawl
Human behavior
Human Factors
Resiliency
Indexes
Scalability
Ad hoc networks
Data processing
computational intelligence
Rough sets
Control Theory
effectiveness evaluation
mobile ad hoc networks
rough set theory
biblio
Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory
Submitted by grigby1 on Wed, 06/02/2021 - 12:19pm
Key-Policy-Attribute-Based Encryption
Signcryption
Scalability
Rough sets
rough set theory
Resiliency
resilience
reduct
pubcrawl
privacy
Access Control
Human behavior
Generalized signcryption
encryption
CORE
Control Theory
Conferences
CloudHealthData
Cloud Computing
Attribute-Based Encryption (ABE)
biblio
A Framework for Trust Management in Cloud Computing Environment
Submitted by aekwall on Tue, 06/01/2021 - 1:29pm
Computing Theory
trust
cloud service provider
composability
Computing Theory and Trust
Cos-Similarity
Filtering
fuzzy controller
Human Factors
Monitoring
particle swarm optimization
pubcrawl
ranking
Resiliency
rough set theory
similarity
biblio
Efficient attribute reduction based on rough sets and differential evolution algorithm
Submitted by aekwall on Tue, 06/01/2021 - 1:22pm
attribute reduction
Classification algorithms
composability
Compositionality
computational intelligence
convergence
Cryptography
differential evolution
filter method
Heuristic algorithms
hybrid intelligence
pubcrawl
rough set theory
Rough sets
security
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 10:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 3:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
biblio
Multiple-fault diagnosis of analog circuit with fault tolerance
Submitted by grigby1 on Thu, 02/15/2018 - 11:47am
Linear programming
Tolerance
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
parameter estimation
nominal circuit node voltages
multiple-fault diagnosis
Multiple-fault
multiple fault diagnosis
Metrics
Mathematical model
analog circuit
Human Factors
human factor
Human behavior
fault tolerance
fault rough set generation
fault diagnosis
fault detection
fault characteristic equation
element isolation
Circuit faults
analogue circuits
Analog circuits
1
2
next ›
last »