Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trust management
biblio
Software-defined Vehicular Ad Hoc Networks with Trust Management
Submitted by grigby1 on Mon, 06/05/2017 - 12:44pm
collaboration
composability
Human behavior
MANET security
Metrics
pubcrawl
Resiliency
Scalability
security
software-defined networking
Trust management
Trust Routing
vehicular ad hoc networks
biblio
A Survey on Trust Evaluation in Mobile Ad Hoc Networks
Submitted by grigby1 on Mon, 06/05/2017 - 12:44pm
collaboration
composability
Human behavior
MANET
MANET security
Metrics
privacy preservation
pubcrawl
Resiliency
Scalability
trust evaluation
Trust management
biblio
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems
Submitted by grigby1 on Mon, 04/24/2017 - 11:42am
Big Data
big data security
big data security in the cloud
Cloud Computing
composability
Human behavior
Intercrossed access control
multimedia big data
pubcrawl
Resiliency
secure financial services
Trust management
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Submitted by BrandonB on Wed, 05/06/2015 - 2:16pm
multidimensional resource service operator
Trusted Computing
trust scheme
Trust management
SOTS
service operator-aware trust scheme
service operator
security
resource matchmaking
resource allocation
Registers
Availability
multicloud environment
multi-cloud environment
middleware framework
middleware
information entropy theory
information entropy
Entropy
Computational modeling
Cloud Computing
Cloud broker
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 2:59pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
« first
‹ previous
1
2
3
4
5
6
next ›
last »