Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MAS
biblio
Group Consensus of Second-order Multi-agent Systems via Intermittent Sampled Control
Submitted by aekwall on Wed, 03/23/2022 - 8:33am
Delay effects
group consistency
Human behavior
intermittent sampled
MAS
multi-agent systems
Pattern analysis
Protocols
pubcrawl
Scalability
security
Social Agents
Stability analysis
Topology
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
Promoting Reusability and Extensibility in the Engineering of Domain-Specific Conversational Systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:32am
intelligent conversational systems
Task Analysis
Scalability
pubcrawl
Natural languages
natural language interfaces
multiagent systems
multi-agent systems
Metrics
Medical services
MAS
architecture
Information State
Human behavior
History
engineering domain-specific conversational systems
Dialogue Manager
conversational agents
computer architecture
chatbots
centralized dialogue control
biblio
A Multi-Agent Model for Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 10:18am
Anomaly Detection
network requirements
network intrusions
Multi Agent System
MAS agents
Hadoop distributed file system
distribution
distributed intrusion detection model
DIDS
Big networks
big computer infrastructure
multiagent system
autonomy
Intrusion Detection
computer network security
computer security
MAS
Databases
network intrusion detection
multi-agent systems
Metrics
composability
pubcrawl
Resiliency
security
Big Data
IDS
biblio
A Survey of Multi-Agent System Approach in Risk Assessment
Submitted by aekwall on Mon, 02/25/2019 - 10:43am
dynamic risk assessment field
Supply Chain Risk Assesment
static risk
software agents
robots
risk assessment
multiagent systems
multiagent system approach
MAS
Fires
computer architecture
dynamic risk
DRA
decision-making
supply chains
risk management
multi-agent systems
Metrics
pubcrawl
biblio
MAS: Mobile-Apps Assessment and Analysis System
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Mobile Applications
Trusted Computing
Taiwan government
static analysis
Security Validation
security of data
Scalability
Resiliency
resilience
pubcrawl
program diagnostics
Mobile Security
mobile computing
Mobile communication
mobile apps assessment and analysis system
Android (operating system)
Metrics
MAS
Human Factors
Human behavior
Guidelines
Government
Google Play store
Google
encryption
dynamic analysis
automatic security validation system
android encryption
Android apps
Android app
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks