Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trustworthy Systems
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
contracts
Trustworthy Systems
trustworthy IoT assurance evaluation
trustworthy evidence collection
smart IoT systems clash
service-based methodology
mobile end users
hyperledger fabric blockchain
cloud-based applications
Assurance Evaluation
secure environment
cyber physical systems
interconnected devices
IoT
smart contracts
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
Internet of Things
Cloud Computing
biblio
From Oracles to Trustworthy Data On-Chaining Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
TLS
Trustworthy Systems
voting
truthfulness
trustworthy data on-chaining systems
Oracle systems
Oracle
on-chaining
blockchain-external data sources
cyber physical systems
Trusted Computing
Trusted Execution Environment
smart contract
blockchain transactions
trustworthiness
blockchain
composability
pubcrawl
Resiliency
biblio
Trustworthy Management in Decentralized IoT Application using Blockchain
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
IoT system
Trustworthy Systems
trustworthy management
Trust management
trust issue
supply chain system
Smart City
smart car
security
Resiliency
pubcrawl
privacy issues
privacy
IoT technology
associated users
IoT
Internet of Things
human living standard
ethereum
decentralized IoT application
data privacy
data modification
cyber physical systems
current centralized system
composability
blockchain technology
Blockchain implementation
blockchain
biblio
ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
host app
Trustworthy Systems
trustworthy execution environment
trusted OS
trusted applications
TEE driver
TEE constructing method
secure world
secure functions
secure code size
popular security features
mobile platforms
mobile app dynamically
mobile
security of data
current TEE solutions
ALTEE
.so library
cyber physical systems
TEE
operating systems (computers)
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
TrustZone
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
spectrum databases
Federal Communications Commission
frequency 150.0 MHz
frequency 3.5 GHz
gallium arsenide
seamless spectrum
secondary users
sensitive operational information
Spectrum access system
spectrum availability
FCC regulatory design requirements
spectrum demand
spectrum usage
SU privacy issues
Synthetic aperture sonar
TrustSAS
trustworthy framework
trustworthy spectrum access system
Trustworthy Systems
blockchain technology
data privacy
telecommunication security
Resiliency
pubcrawl
composability
privacy
Peer-to-peer computing
blockchain
Databases
Cryptography
radio spectrum management
cyber physical systems
broadband networks
CBRS band
citizens broadband radio service
cryptographic techniques
dynamic spectrum access system
FCC
biblio
ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for Resilient Cloud Computing
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
cyber physical systems
Trustworthy Systems
trustworthy cloud-enabled applications
resilient cloud computing
research and development
project management
privacy-assuring ecosystem
multiinstitutional research and development
distributed cloud computing providers
ATMOSPHERE project
adaptive ecosystem
security
Virtualization
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Trusted Computing
data privacy
virtualisation
Cloud Computing
biblio
Framework for Trustworthy Software Development
Submitted by aekwall on Mon, 04/13/2020 - 10:20am
auditability
Trustworthy Systems
trustworthy software development
trustworthy software
transparency
total product life cycle
smart advisors
process level
intelligent software applications
governance framework
Governance
bias-free
security of data
application development life cycle
algorithmic level
cyber physical systems
ubiquitous computing
trustworthiness
software engineering
Provenance
Compliance
composability
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
next ›
last »