Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy sets
biblio
Decoding of Mind-Generated Pattern Locks for Security Checking Using Type-2 Fuzzy Classifier
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
resilience
Human Factors
Interval Type-2 Fuzzy Classifier
mind-generated pattern locks
neurological disorder
neuromuscular disability
P300 signals
pattern locks
pubcrawl
human factor
Resiliency
Scalability
security
security checking
signal classification
Training
type-2 fuzzy classifier
electroencephalography
BCI paradigm
BCI system
biometric security option
biometrics (access control)
brain-computer interface system
brain-computer interfaces
Decoding of Pattern Locks
electroencephalogram signals
Band-pass filters
Event RelatedPotentials
feature extraction
Firing
fuzzy set theory
Fuzzy sets
handicapped aids
Human behavior
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
The Method of Expert Evaluation of Airports Aviation Security Using Perceptual Calculations
Submitted by grigby1 on Wed, 11/14/2018 - 1:20pm
restricted areas protection
Linguistics
perceptual calculations
perceptual computer
Personnel
proactive control
pubcrawl
resilience
Resiliency
intruders
Scalability
SCAUI elements
SCAUI state control
system of counteraction to acts of unlawful interference
technical systems
type-2 fuzzy sets
uncertainty
unlawful interference
AS employees
security
acts of unlawful interference
aircraft safety
airport
airport AS
airport security
Airports
airports aviation security
expert systems
Atmospheric modeling
aviation security
Computational modeling
expert evaluation
expert quality assessment
functional state
Fuzzy sets
Human behavior
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
AHP, fuzzy sets and TOPSIS based reliable route selection for MANET
Submitted by BrandonB on Wed, 05/06/2015 - 9:03am
mobile ad-hoc network
triangular fuzzy numbers
TOPSIS based reliable route selection
TOPSIS
telecommunication security
telecommunication network routing
technique-for-order performance-by-similarity-to-ideal solution
source node
Routing protocols
Routing
Pragmatics
number theory
multiple route ranking
AHP
mobile ad hoc networks
MCDM
MANET
linguistic values
Fuzzy sets
fuzzy set theory
Fuzzy logic
destination node
criteria weights
analytical hierarchy process
analytic hierarchy process
AHP based reliable route selection
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 8:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
« first
‹ previous
1
2