Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fuzzy
biblio
Fuzzy Logic based Static Synchronous Series Compensator (SSSC) to enhance Power System Security
Submitted by grigby1 on Fri, 07/28/2023 - 3:35pm
Regulation
SSSC
power handling capacity
Pi
FACTS
damping of oscillation
damping
Fuzzy
System performance
security
Voltage control
Fuzzy logic
simulation
power transmission lines
Resiliency
resilience
Metrics
pubcrawl
biblio
Development of a Cyber-Situational Awareness Model of Risk Maturity Using Fuzzy FMEA
Submitted by aekwall on Mon, 11/29/2021 - 2:08pm
COVID-19
situational awareness
maturity
Fuzzy
FMEA
cyber-situational awareness
Cyber-security
Capability maturity model
Pandemics
Computer crime
Predictive Metrics
Ransomware
Decision Making
risk management
composability
Resiliency
pubcrawl
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
Fuzzy Optimization of Automobile Supply Chain Network of Considering Risks
Submitted by grigby1 on Wed, 03/08/2017 - 1:56pm
fuzzy price
transportation costs
total profit risk minimization
supply chains
supply chain network
supply chain management
risks
risk management
pubcrawl170110
profitability
Pricing
optimization
optimisation
Industries
fuzzy set theory
Approximation methods
fuzzy optimization
Fuzzy
distribution centers
discretization points
discrete fuzzy problem
Cplex 12.6
continuous fuzzy problem
component suppliers
component plants
automotive components
automobiles
automobile supply chain network
automobile
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model