Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trust management
biblio
Intelligent Approaches for the Trust Assessment
Submitted by aekwall on Tue, 06/01/2021 - 1:30pm
Computing Theory
trust
composability
Computing Theory and Trust
fuzzy system
genetic algorithm
Human Factors
pubcrawl
Resiliency
Trust management
biblio
Trust Management in Social Internet of Things: Architectures, Recent Advancements and Future Challenges
Submitted by grigby1 on Tue, 03/30/2021 - 12:05pm
Analytical models
Challenges.
Cybersecurity
Human behavior
Human Factors
Internet of Things
pubcrawl
Scalability
search problems
security
Social Internet of Things
social networking (online)
Social Objects
Social Relationships
Trust management
vehicle dynamics
biblio
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
context-aware approach
trustworthiness inference framework
trust generation
trust elements
sociological principles
social networking
recommendation trust
psychological principles
kernel-based nonlinear multivariate grey prediction model
kernel-based nonlinear multivariate grey prediction
internal similarity trust
human behaviors
fuzzy logic method
familiarity trust
external similarity trust
context-aware trustworthiness inference framework
Internet of Things
Social Internet of Things
grey systems
psychology
Trust management
Predictive models
trustworthiness
Fuzzy logic
smart objects
direct trust
Reliability
social networking (online)
composability
pubcrawl
Trusted Computing
Protocols
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
Research on Cloud Computing Security Evaluation Model Based on Trust Management
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Probability distribution
uncertainty
Trusted Computing
trust management mechanism
Trust management
subsequent cloud computing service
sharing applications
security of data
security assessment model
security
Scalability
Resiliency
resilience
quantifiable analysis
pubcrawl
Big Data trust management
information security
Human Factors
DS evidence theory method
DS evidence theory
data unification
Data Security
data credible quantification mechanism
computer theory
Computational modeling
cloud services
Cloud Security
cloud computing security evaluation model
cloud computing security
Cloud Computing
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
Agent Based Fog Architecture using NDN and Trust Management for IoT
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
robust system
IoT generation
multi-agent systems
Named Data Network Security
Named Data Network(NDN)
NDN
present-day network infrastructure
pubcrawl
resilience
Resiliency
IoT devices
Scalability
secured named data network protocol
secured system
security
Servers
service-oriented architecture
traffic usage reduction
Trust management
drastic rate
agent based composition model
agent society
caching layer
Cloud Computing
Computational modeling
computer architecture
computer network security
Data models
Agent Based Communication
edge computing
fog architecture
fog based agent model
Fog computing
fog layer
Human behavior
Internet of Things
Internet of Things (IoT)
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 11:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Trustworthy Management in Decentralized IoT Application using Blockchain
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
IoT system
Trustworthy Systems
trustworthy management
Trust management
trust issue
supply chain system
Smart City
smart car
security
Resiliency
pubcrawl
privacy issues
privacy
IoT technology
associated users
IoT
Internet of Things
human living standard
ethereum
decentralized IoT application
data privacy
data modification
cyber physical systems
current centralized system
composability
blockchain technology
Blockchain implementation
blockchain
« first
‹ previous
1
2
3
4
5
6
next ›
last »