Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy rules
biblio
Clustering-based routing protocol using FCM-RSOA and DNA cryptography algorithm for smart building
Submitted by grigby1 on Mon, 07/31/2023 - 12:26pm
DNA
Reptile Search Optimization
fuzzy rules
Fuzzy C-Means
African Vulture Optimization
Fuzzy Cryptography
smart buildings
DNA cryptography
Base stations
pubcrawl
Clustering algorithms
Wireless communication
wireless sensor networks
Scalability
Throughput
Resiliency
resilience
Metrics
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
A New Intelligent Neuro #x2013;Fuzzy Paradigm for Energy-Efficient Homes
Submitted by BrandonB on Tue, 05/05/2015 - 8:15am
Home appliances
Table lookup
smart house
Smart Grids
Smart Grid
Pricing
power engineering computing
Neurons
Neural networks
neural nets
intelligent neuro-fuzzy paradigm
intelligent lookup table
intelligent EMS
iEMS
home automation
associative neural network
fuzzy subsystem
fuzzy set theory
fuzzy rules
Fuzzy logic
energy-efficient homes
energy management systems
energy management
Energy Efficiency
energy consumption
DR
Demand response (DR)
demand response
automated energy management systems