Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Biological cells
biblio
GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment
Submitted by aekwall on Tue, 05/25/2021 - 2:19pm
Scalability
encryption
performance evaluation
Task Analysis
pubcrawl
policy-based governance
Cryptography
genetic algorithm
Logic gates
Biological cells
Kubernetes
CP-ABE
Load management
load balancing
e-health
biblio
Providing Confidentiality in Optical Networks: Metaheuristic Techniques for the Joint Network Coding-Routing and Spectrum Allocation Problem
Submitted by grigby1 on Tue, 02/23/2021 - 1:34pm
genetic algorithm
routing and spectrum allocation
real-world network scenarios
novel metaheuristic algorithms
network coding-based routing and spectrum allocation problem
NC-based RSA algorithms
modified simulated annealing
metaheuristic techniques
joint network coding-routing
elastic optical networks
spectrum utilization
Biological cells
Statistics
Sociology
security
network coding
simulated annealing
genetic algorithms
resource management
telecommunication network routing
composability
public key cryptography
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Efficient Auto key based Encryption and Decryption using GICK and GDCK methods
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
GICK
Statistics
Sociology
Resiliency
pubcrawl
primary key
Key Genetic Algorithm
key generation
Heuristic algorithms
Hamming distance
artificial intelligence techniques
genetic algorithms
GDCK
encryption keys
efficient encryption
cyber physical systems
Cryptography
Conferences
composability
Biological cells
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
Metrics
modern malware
host-based intrusion detection system
botnet detection system
botnet attack detection
Biological cells
botnet
genetic algorithm
genetic algorithms
Compositionality
tools
botnets
invasive software
network security
intrusion detection system
computer network security
Resiliency
pubcrawl
IP networks
Intrusion Detection
biblio
A Novel Intrusion Detection Method for Internet of Things
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
intrusion attacks
security of data
optimal network structure
Neurons
network intrusion detection
Metrics
IoT technology
IoT system
IoT networks
Intrusion Detection Systems
intrusion detection model
intrusion detection method
Intrusion Detection
belief networks
Internet of Things era
Internet of Things
genetic algorithms
Embedded System
deep learning
Deep Belief Network
DBN
Biological cells
Artificial Neural Networks
Resiliency
composability
pubcrawl
biblio
Towards more accurate multi-label software behavior learning
Submitted by BrandonB on Wed, 05/06/2015 - 1:34pm
modern software system
Training
software vendor
software maintenance
software fault tolerance
Software Behavior Learning
Software algorithms
Software
public domain software
Prediction algorithms
open source programs
multilabel software behavior learning
Multi-label Learning
Baidu
MLL-GA
Ml.KNN
learning (artificial intelligence)
genetic algorithms
genetic algorithm
fault labels
F-measures
execution trace
crash report
Computer crashes
Biological cells
biblio
Genetic Hash Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:47am
genetic hash algorithm
Watermarking
visualization
trees (mathematics)
security
search optimization technique
image watermarking
hash visualization
Hash functions
Genetics
authentication
genetic algorithms
Fitness value
Data visualization
data hiding
data encapsulation
Cryptography
complex random generated images
Chromosome
Biological cells
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator