Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
genetic algorithm
biblio
Intelligent Approaches for the Trust Assessment
Submitted by aekwall on Tue, 06/01/2021 - 1:30pm
Computing Theory
trust
composability
Computing Theory and Trust
fuzzy system
genetic algorithm
Human Factors
pubcrawl
Resiliency
Trust management
biblio
GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment
Submitted by aekwall on Tue, 05/25/2021 - 3:19pm
Scalability
encryption
performance evaluation
Task Analysis
pubcrawl
policy-based governance
Cryptography
genetic algorithm
Logic gates
Biological cells
Kubernetes
CP-ABE
Load management
load balancing
e-health
biblio
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:45pm
quick temporary networked communications capabilities
MESH network
bandwidth requirements
different user distributions
evolutionary adaptive network deployment algorithm
evolving dynamically reconfiguring UAV-hosted mesh networks
flying network base stations
initial deployment
overwatch
potential field parameters
potential fields
remotely operated vehicles
remote areas
reposition UAVs
scouting
tuned potential fields
UAV network
Unmanned Aerial Vehicles
unmanned aerial vehicles networks
user bandwidth coverage
user bandwidth needs
Wireless Mesh Network Security
mobile radio
Resiliency
pubcrawl
composability
batteries
wireless sensor networks
Metrics
mobile robots
Training
optimisation
network lifetime
security
genetic algorithm
genetic algorithms
Bandwidth
Mesh networks
control engineering computing
Path Planning
autonomous aerial vehicles
Base stations
distributed control
biblio
Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem
Submitted by grigby1 on Tue, 02/23/2021 - 2:34pm
genetic algorithm
routing and spectrum allocation
real-world network scenarios
novel metaheuristic algorithms
network coding-based routing and spectrum allocation problem
NC-based RSA algorithms
modified simulated annealing
metaheuristic techniques
joint network coding-routing
elastic optical networks
spectrum utilization
Biological cells
Statistics
Sociology
security
network coding
simulated annealing
genetic algorithms
resource management
telecommunication network routing
composability
public key cryptography
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint
Submitted by grigby1 on Tue, 02/16/2021 - 1:24pm
privacy preservation
multi-threshold
Itemsets
Data Sanitization
Statistics
Sociology
genetic algorithm
genetic algorithms
optimization
Compositionality
privacy
Data mining
Databases
Data models
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Image Encryption Using Genetic Algorithm and Bit-Slice Rotation
Submitted by aekwall on Mon, 02/15/2021 - 4:51pm
Generators
structural similarity index measure
SSIM
Sociology
Resiliency
pubcrawl
Indexes
image encryption algorithms
image encryption
Image coding
Genetics
genetic algorithms
genetic algorithm
bit plane rotation
fully encrypted image
encryption
efficient encryption
digital image
cyber physical systems
cryptography attacks
Cryptography
composability
chaotic encryption
bit-slice rotation
bit plane slicing
Bit Plane Slice
biblio
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
mean square error
World Wide Web
transposition cipher method
text file
text encryption
text encoding
SNR
single to noise ratio
Resiliency
pubcrawl
PSNR
privacy
Predictive Metrics
performance evaluation
peak single to noise
MSE
Cryptography
Information hiding
image visual quality
image retrieval
Image Processing
Image coding
Human behavior
hidden data mechanism
genetic algorithms
genetic algorithm
encryption
DNA encoding
DNA cryptography
DNA coding
DNA
digital media
biblio
Hybrid Technique of Genetic Algorithm and Extended Diffie-Hellman Algorithm used for Intrusion Detection in Cloud
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
genetic algorithm
threat
security of data
Resiliency
resilience
pubcrawl
malicious insiders
Intrusion Detection
insecure APIs
information breaches
hybridization
genetic algorithms
API
Extension in Diffie-Hellman algorithm
extended Diffie-Hellman algorithm
Denial of Services (DOS)
data thrashing
data storage
Compositionality
cloud transmission
Cloud Computing
application programming interface
application program interfaces
APIs
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Prevention Techniques Employed in Wireless Ad-Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
optimisation
wireless sensor networks
Wireless communication
Wireless Ad-Hoc Networks
vehicular ad hoc networks
VANET
telecommunication security
telecommunication network routing
Routing
Resiliency
resilience
pubcrawl
Ad hoc networks
Metrics
manet attack prevention
MANET
genetic algorithm
fabrication
Compositionality
Communication system security
Black hole attack
Artificial Bee Colony
Ad-hoc wireless networks
« first
‹ previous
1
2
3
4
5
next ›
last »