Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Rough sets
biblio
Towards Characterization of General Conditions for Correlated Differential Privacy
Submitted by grigby1 on Fri, 05/12/2023 - 9:20am
pubcrawl
Human behavior
Human Factors
Correlation
Scalability
privacy
Measurement
resilience
differential privacy
Rough sets
Data protection
Resiliency
Control Theory
parameter estimation
data correlation
biblio
An integrated rough-DEMA℡ method for sustainability risk assessment in agro-food supply chain
Submitted by grigby1 on Fri, 09/09/2022 - 2:55pm
risk management
pubcrawl
Metrics
Companies
uncertainty
risk assessment
Economics
supply chains
Rough sets
sustainable development
Agro-food supply chain
DEMA℡
interval rough numbers
sustainability
supply chain risk assessment
biblio
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
security
pubcrawl
Human behavior
Human Factors
Resiliency
Indexes
Scalability
Ad hoc networks
Data processing
computational intelligence
Rough sets
Control Theory
effectiveness evaluation
mobile ad hoc networks
rough set theory
biblio
A Representation of Business Oriented Cyber Threat Intelligence and the Objects Assembly
Submitted by grigby1 on Mon, 10/04/2021 - 2:04pm
pubcrawl
usiness
uncertainty
tools
taxonomy
set approximation
Rough sets
rough set
Resiliency
representation
composability
object oriented security
Metrics
generalised grey number
Fuzzy sets
fuzzy set
Fuzzy logic
Feeds
cyber threat intelligence
biblio
Operative Access Regulator for Attribute Based Generalized Signcryption Using Rough Set Theory
Submitted by grigby1 on Wed, 06/02/2021 - 11:19am
Key-Policy-Attribute-Based Encryption
Signcryption
Scalability
Rough sets
rough set theory
Resiliency
resilience
reduct
pubcrawl
privacy
Access Control
Human behavior
Generalized signcryption
encryption
CORE
Control Theory
Conferences
CloudHealthData
Cloud Computing
Attribute-Based Encryption (ABE)
biblio
Efficient attribute reduction based on rough sets and differential evolution algorithm
Submitted by aekwall on Tue, 06/01/2021 - 12:22pm
attribute reduction
Classification algorithms
composability
Compositionality
computational intelligence
convergence
Cryptography
differential evolution
filter method
Heuristic algorithms
hybrid intelligence
pubcrawl
rough set theory
Rough sets
security
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory
Submitted by aekwall on Mon, 01/06/2020 - 9:35am
information entropy difference privacy
use information entropy
Sensitivity
Scalability
Rough sets
rough set theory
Resiliency
random noise
pubcrawl
privacy protection
privacy
personalized noise
personal sensitive information
information entropy differential privacy solution
Computing Theory and Privacy
information entropy
Human behavior
Entropy
differential privacy protection data method
differential privacy
data privacy
data correlations
correlation data privacy issues
Correlation
composability
behavioral prediction
Association data
associated data
biblio
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
random forests
pattern classification
personal information
Phishing
phishing attack detection
Phishing Detection
phishing Web sites
pubcrawl
random forest classification
machine learning-based strategies
rough set theory
Rough sets
Training
Uniform resource locators
universal feature set
Web pages
Web sites
Fuzzy Rough Set
Computer crime
confidential information
cybercrime activities
definitive features
Electronic mail
feature extraction
Feature Selection
FRS feature selection
classifiers
fuzzy rough set feature selection
fuzzy rough set theory
fuzzy set theory
generalizable phishing detection
Human behavior
human factor
legitimate Web site
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 10:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
1
2
next ›
last »