Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust metric
biblio
New Trust Metric for the RPL Routing Protocol
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
security
resilience
Resiliency
Routing
routing nodes
Routing protocols
RPL
RPL routing protocol
Scalability
Secure Routing
reliable routing processes
Selfish nodes
telecommunication network reliability
telecommunication security
trust inference problem
Trust management
trust metric
trust objective function
Trust Routing
vital security requirement
Linear programming
BR
collaboration
composability
distributed Bellman-Ford algorithm
DODAG information object message
ERNT
extended RPL node trustworthiness
Internet of Things
IoT security
border router
lossy networks
Low power
maintenance engineering
Measurement
metric based RPL trustworthiness scheme
MRTS
new Objective Function TOF
pubcrawl
biblio
A Computational Model to Evaluate Honesty in Social Internet of Things
Submitted by K_Hooper on Wed, 02/14/2018 - 12:03pm
Human behavior
human trust
Knowledge
pubcrawl
Regression
SIoT
social networks
subjective models
trust attributes
trust computation
trust metric
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl