Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
adaptive systems
biblio
An Adaptive Grey Wolf Algorithm Based on Population System and Bacterial Foraging Algorithm
Submitted by aekwall on Mon, 12/14/2020 - 11:39am
pubcrawl
composability
convergence
particle swarm optimisation
Swarm Intelligence
optimization
particle swarm optimization
Sociology
Statistics
Compositionality
adaptive systems
grey systems
adaptive
adaptive grey wolf algorithm
AdGWO algorithm
bacterial foraging algorithm
bacterial foraging optimization algorithm
BFO
competitive algorithm
grey wolf optimization
Grey Wolf optimizer
Microorganisms
population system
premature convergence
swarm intelligence optimization algorithm
Swarm optimization algorithm
biblio
MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks
Submitted by aekwall on Mon, 12/07/2020 - 11:09am
neural style transfer
Scalability
Resiliency
Predictive Metrics
pubcrawl
adaptive neural networks
adaptive systems
casual creativity
core technology
creative editing process
creative expression
Creativity
generalized user interface
Image Processing
inherent limitations
Iterative methods
localized editing process
localized image stylization
low-level controls
MaeSTrO
manifold artistic styles
Mobile app
mobile artists
mobile computing
mobile expressive rendering
Mobile handsets
neural nets
Neural networks
neural style transfer techniques
non photorealistic rendering
Painting
particular style transfer
rendering (computer graphics)
style transfer
style transfer orchestration
tools
User control
user interfaces
user tests
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
Access Control
authorisation
authorization
Internet of Things
Internet-of-Things
Trusted Computing
pubcrawl
estimation
trust relationships
IoT system
Permission
security goals
Dynamic scheduling
adaptive systems
Human behavior
access rights
human trust
adaptive authorization
dynamic trust estimation
I-sharing
public Internet-of-Things
public IoT environments
system integrity
TARAS mechanism
trust threshold
trust-aware
trust-aware role-based access control system
biblio
Enhancing Smart Grid Cyber-Security Using A Fuzzy Adaptive Autonomy Expert System
Submitted by aekwall on Mon, 10/12/2020 - 10:36am
False Data Detection
Adaptive Autonomy
adaptive systems
automation
Complexity theory
Computer crime
cyber security
environmental conditions
expert system database
expert systems
Expert Systems and Security
fuzzy adaptive autonomy expert system
fuzzy expert system
fuzzy rule
fuzzy set theory
fuzzy systems
gradient descent algorithm
gradient methods
Human automation interaction
Human behavior
human computer interaction
information technology
leave-one-out cross-validation
level of automation
performance shaping factors
power engineering computing
power system security
pubcrawl
Resiliency
Scalability
security of data
smart grid cybersecurity
Smart Grids
smart power grids
biblio
On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework
Submitted by aekwall on Mon, 10/12/2020 - 10:31am
Scalability
data privacy
Conferences
learning (artificial intelligence)
Human behavior
pubcrawl
multi-agent systems
Databases
Decision Making
integrated circuits
Human Factors
distributed systems
Gold
Systematics
Autonomic systems
learning
Interconnected Systems
3D framework
adaptive systems
agent-specific goals
collective self-adaptive systems
CSAS applications
Distributed Sensing
environmental data collection
learning techniques
multifaceted analysis
multiple agents
privacy-aware mechanisms
search and rescue operations
self-adaptive systems
system-wide goals
taxonomy
Expert Systems and Privacy
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
security of data
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
adaptive reconfigurable features
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
mitigation scheme
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 10:19am
computer network security
IP networks
Resiliency
pubcrawl
composability
Peer-to-peer computing
Metrics
trust
Statistics
network intrusion detection
internet
Cybersecurity
Anomaly Detection
probability
statistical analysis
microsoft windows
network security
anomaly-based Intrusion Detection Systems
Trust management
intrusion
abnormal behaviors
adaptive systems
adaptive threshold method
ADS
Anomaly-based Detection Systems attempt
Bipartite graph
dynamic environment
dynamic network environment
normal behaviors
normal data instances
suspicious behaviors
biblio
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search
Submitted by grigby1 on Tue, 01/21/2020 - 10:25am
belief networks
pubcrawl
composability
Resiliency
Adaptation models
adaptive optimization
adaptive optimization DBN
adaptive systems
collaboration
deep belief net
deep learning
deep learning model
grid search
Human behavior
insider threat
insider threat detection method
learning (artificial intelligence)
learning rate
Metrics
network structure
one-dimensional parameter optimization
Optimization methods
optimization parameters
policy-based governance
resilience
search problems
security of data
threat detection rate
Training
two-dimensional grid
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
Adaptation models
adaptive method
adaptive systems
cold start
Computational modeling
Data models
Human Factors
learn directive trust strength
learning (artificial intelligence)
Mathematical model
pubcrawl
recommendation quality
recommender systems
resilience
Resiliency
Scalability
security of data
Social network services
sparse users
trust directions
trust relationships
trust-aware recommender systems
Trusted Computing
unified framework
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
Adaptive Intrusion Prevention System
adaptive IPS
adaptive systems
attack prevention
attacker host
computer architecture
computer network security
Fuzzy logic
fuzzy set theory
host attacks
intrusion prevention system
IP networks
IPS
logic architecture
logic network
malicious packet
Metrics
pubcrawl
resilience
Resiliency
SDN network
security
Servers
Software
software defined networking
software-defined network
1
2
3
next ›
last »