Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust evaluation
biblio
Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks
Submitted by aekwall on Fri, 01/13/2023 - 2:52pm
uncertainty
zero trust security
zero trust
trust evaluation
threshold policy
Partially Observable Markov Decision Processes (POMDP)
security policies
usability
adaptive systems
Human Factors
network security
Decision Making
Resiliency
Metrics
Scalability
pubcrawl
Markov processes
biblio
Malicious Nodes Detection Scheme Based On Dynamic Trust Clouds for Wireless Sensor Networks
Submitted by grigby1 on Fri, 08/12/2022 - 1:25pm
uncertainty
trust model
Computers and information processing
cloud theory
trust evaluation
Computing Theory
trust
WSNs
simulation
Cloud Computing
composability
wireless sensor networks
Computational modeling
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Trusted Model Based on Multi-dimensional Attributes in Edge Computing
Submitted by grigby1 on Fri, 08/12/2022 - 1:24pm
composability
trusted model
multi-dimensional attributes
trust evaluation
Memory
Computing Theory
trust
reliability theory
edge computing
Internet of Things
Computational modeling
Data models
Resiliency
resilience
Human behavior
pubcrawl
Servers
Adaptation models
biblio
A Hybrid Algorithm for Evaluating Trust in Online Social Networks
Submitted by grigby1 on Tue, 07/27/2021 - 11:06am
Computational modeling
computer theory
graph theory
Human behavior
learning
learning automata
Measurement
online social network
Power capacitors
pubcrawl
Reliability
security
social networking (online)
trust
trust evaluation
Trusted paths
biblio
A Trust-Based Security Scheme for 5G UAV Communication Systems
Submitted by grigby1 on Thu, 06/24/2021 - 9:51am
computer architecture
Unmanned Aerial Vehicles (UAVs)
Unmanned Aerial Vehicles
trust evaluation
simulation
security
resilience
Reliability
pubcrawl
policy-based governance
false trust
Pervasive Computing Security
composability
Communication Systems
Autonomic Security
5G mobile communication
5G communication
Metrics
Human Factors
Scalability
Resiliency
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
trust evaluation
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
energy management
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
Measurement
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Cryptography
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Trust Evaluation Strategy Based on Grey System Theory for Medical Big Data
Submitted by aekwall on Mon, 09/21/2020 - 2:39pm
Medical diagnostic imaging
Computer Theory and Trust
trust gray evaluation model
trust evaluation weight system
trust evaluation strategy
trust evaluation index weight
trust evaluation
traditional evaluation method
Medical Big Data
grey systems
grey system theory
evaluation process
decision fuzzy
analytic hierarchy process (AHP)
AHP method
Access Control
Sensitivity
Compositionality
medical information systems
analytic hierarchy process
statistical analysis
Indexes
fuzzy set theory
privacy
composability
pubcrawl
Task Analysis
Medical services
Big Data
1
2
next ›
last »