Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy theory
biblio
Research on Enterprise Information Security Risk Assessment System Based on Bayesian Neural Network
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
Data models
fuzzy theory
Bayesian Regularization
policy governance
Resiliency
computer theory
risk assessment
Stability criteria
simulation
Compositionality
composability
Training
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
Organizations
information security
collaboration
biblio
Research on Security Evaluation Technology of Wireless Access of Electric Power Monitoring System Based on Fuzzy
Submitted by grigby1 on Thu, 09/09/2021 - 8:00am
power systems
wireless security assessment
wireless networks
security model
security
Safety
Resiliency
resilience
pubcrawl
Communication system security
power monitoring system
Monitoring
fuzzy theory
delphi method
Control Theory
composability
component
biblio
Detection of False Data Injection Attack in Automatic Generation Control System with Wind Energy based on Fuzzy Support Vector Machine
Submitted by grigby1 on Thu, 05/13/2021 - 11:22am
Power system dynamics
wind turbines
Wind Storage System
Wind speed
Support vector machines
support vector machine
Scalability
Resiliency
resilience
pubcrawl
False Data Detection
Mathematical model
Human behavior
fuzzy theory
false data injection attack
Data models
Automatic Generation Control System
automatic generation control
Attack vectors
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
security
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
Internet fraud
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
financial crime
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
Anti-money Laundering
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile ad hoc network security
trust-based multicast routing protocol
trust model
telecommunication security
Routing protocols
network trust dynamic adaptability
network interaction quality
multiple trust decision factor
multicast protocols
multi-agent systems
multi-agent system
mobile ad hoc networks
analytic hierarchy process
malicious node detection
information-theoretic framework
fuzzy theory
fuzzy set theory
Fuzzy logic
fuzzy analytic hierarchy process theory
FAPtrust
entropy weight method
decision-making
Decision Making