Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
fuzzy theory
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by
grigby1
on Tue, 03/07/2017 - 12:36pm
Anti-money Laundering
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
financial crime
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
Internet fraud
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
security
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
biblio
A graph-based evidence theory for assessing risk
Submitted by
grigby1
on Mon, 02/27/2017 - 11:55am
cyber-physical layers
Electronic mail
epistemic uncertainty management
fuzzy set theory
fuzzy theory
graph representation
graph theory
graph-based evidence theory
heterogeneous sources
internet
knowledge based systems
Power Grid
power grids
pubcrawl170107
pubcrawl170108
reduced power set
risk assessment
risk evaluation
risk management
rule-based systems
security
security of data
uncertainty
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by
BrandonB
on Wed, 05/06/2015 - 7:55am
analytic hierarchy process
Decision Making
decision-making
entropy weight method
FAPtrust
fuzzy analytic hierarchy process theory
Fuzzy logic
fuzzy set theory
fuzzy theory
information-theoretic framework
malicious node detection
mobile ad hoc network security
mobile ad hoc networks
multi-agent system
multi-agent systems
multicast protocols
multiple trust decision factor
network interaction quality
network trust dynamic adaptability
Routing protocols
telecommunication security
trust model
trust-based multicast routing protocol