Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

voting protocol mechanisms

biblio

Visible to the public Mathematicians to Help Solve the Fake News Voting Conundrum

Submitted by willirn1 on Tue, 09/10/2019 - 5:21pm
  • Articles of Interest
  • C3E 2019
  • Cognitive Security
  • Cognitive Security in Cyber
  • fake news
  • Math
  • voting protocol mechanisms
  • Cognitive Security
  • Articles of Interest
  • C3E 2019
biblio

Visible to the public Model-based control of device replication for trusted data collection

Submitted by BrandonB on Wed, 05/06/2015 - 9:58am
  • Hierarchical Control
  • voting protocol mechanisms
  • trusted data collection
  • Trusted Computing
  • Situational Assessment
  • Sensor Replication
  • security of data
  • security attack
  • quality of service
  • QoS
  • Protocols
  • malicious devices
  • Adaptive Fault-tolerance
  • Frequency modulation
  • device replication autonomic management
  • delays
  • data corruptions
  • Data collection
  • black-box
  • batteries
  • bandwidth attack
  • Bandwidth
  • Attacker Modeling
  • algorithm correctness
biblio

Visible to the public Model-based control of device replication for trusted data collection

Submitted by BrandonB on Thu, 04/30/2015 - 2:06pm
  • Hierarchical Control
  • voting protocol mechanisms
  • trusted data collection
  • Trusted Computing
  • Situational Assessment
  • Sensor Replication
  • security of data
  • security attack
  • quality of service
  • QoS
  • Protocols
  • malicious devices
  • Adaptive Fault-tolerance
  • Frequency modulation
  • device replication autonomic management
  • delays
  • data corruptions
  • Data collection
  • black-box
  • batteries
  • bandwidth attack
  • Bandwidth
  • Attacker Modeling
  • algorithm correctness

Terms of Use  |  ©2023. CPS-VO