Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust value
biblio
Access Control Mechanism Based on Game Theory in the Internet of Things Environment
Submitted by grigby1 on Fri, 05/12/2023 - 10:16am
Games
Behavioral sciences
Resiliency
Control Theory
Regulators
trust value
Nash Equilibrium
game theory
Dynamic scheduling
Internet of Things
Access Control
Scalability
security
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network
Submitted by grigby1 on Wed, 08/10/2022 - 2:41pm
Satellites
trust value
diversity reception
simulation
energy consumption
Packet loss
Routing
composability
Scalability
Resiliency
resilience
pubcrawl
Resists
Secure Routing
micro-nano satellite
Trust Routing
biblio
Secure Routing Protocol in Wireless Ad Hoc Networks via Deep Learning
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
trust value
Trust Routing
Secure Routing
Scalability
Resiliency
resilience
pubcrawl
deep learning
composability
ad hoc wireless networks
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
routing protocol for low power and lossy network
trustworthy nodes
trust-based enhanced secure RPL routing attacks
trust value
Trust Routing
trust evaluation methods
sybil attacks
Sybil attack
standardized proactive routing protocol
security
Secure DODAG Construction
Sec-Trust protocol
Scalability
RPL security
Routing protocols
composability
Routing
resource constrained characteristics
rank attack
pubcrawl
providing routing security using the technique of collective trust mechanism
PROTECT
performance evaluation
IoT network
IoT
Internet of Things
forwarding data packets
energy consumption
computer network security
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV