Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reputation
biblio
A New Technique for Managing Reputation of Peers in the Cooperation Approach for Privacy Protection
Submitted by grigby1 on Tue, 02/22/2022 - 1:23pm
peers cooperation
Urban areas
Smart City
security
Scalability
Resiliency
resilience
reputation
pubcrawl
privacy
peer to peer security
peer-to-peer security
Peer-to-peer computing
Metrics
machine learning algorithms
IoT
Internet of Things
Human Factors
edge computing
Databases
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
Receivers
man-in-the-middle attack
man-in-the-middle attacks
Metrics
personal data disclosure
personally identifiable information
PII
policy-based governance
privacy
pubcrawl
Python
Information Assurance
reputation
resilience
Resiliency
Scalability
Self-Sovereign Identity
self-sovereign identity agents
Sensitivity
user autonomy
user immutability
Data disclosure
attribute sensitivity score model
authorisation
blockchain
blockchains
collaboration
composability
confidence level
credential exchange
credential exchanges
attribute sensitivity
data privacy
distributed ledger
Engines
Human behavior
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
Predictive Proof of Metrics – a New Blockchain Consensus Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
PPoM
predictive security metrics
reputation and reward based approach
reputation
provider prediction engine
Proof of Metrics
predictive proof of metrics
prediction
PPoM based blockchain
machine learning
Metrics
consensus protocol
blockchain ecosystems
blockchain consensus protocol
Cryptographic Protocols
security
pubcrawl
blockchain
biblio
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
smart contracts
Repudiation
verifying party
vehicular networks
VANETs
trustworthy nodes
trusted centralized party
smart contract-based approach
reputable trusted node
IPFS
greedy authenticated nodes
computed reputation rating
reputation
MatLab simulation
File systems
digital signatures
traffic engineering computing
trust
Mathematical model
blockchain
Metrics
Peer-to-peer computing
Protocols
composability
pubcrawl
Human behavior
Resiliency
Trusted Computing
security
data integrity
data privacy
biblio
Social Analysis of Game Agents: How Trust and Reputation can Improve Player Experience
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
computer games
Social Agents
video games
social interactions
Social Behavior
social analysis
Settlers of Catan
reputation models
reputation
NPC agents
nonplayer character behavior
multiplayer games
interactive games
Intelligent Agents
gaming experience
game agents
Scalability
autonomous agents
artificial intelligence techniques
Artificial Intelligence
Buildings
Human Factors
human computer interaction
Urban areas
Proposals
Games
bots
trust
Mathematical model
multi-agent systems
Roads
pubcrawl
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
security
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
PAMP
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
Immune system
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
nodes act
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
biblio
Reputation-Based Security System For Edge Computing
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
composability
Compositionality
Computing Theory and Trust
mobile edge-clouds
p2p
pubcrawl
reputation
resilience
Resiliency
Scalability
Security Heuristics
trust
1
2
next ›
last »