Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trustworthy Systems
biblio
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
Submitted by aekwall on Mon, 02/10/2020 - 10:57am
security of data
pubcrawl
Resiliency
SATIN
Scalability
secure introspection mechanism
secure world checking solutions
secure world introspection
security
operating systems (computers)
security policy violations
security protection
Trusted Computing
Trusted Execution Environment
trustworthy asynchronous introspection mechanism
Trustworthy Systems
TrustZone security extension
Mobile handsets
Asynchronous Introspection
composability
cyber physical systems
Evasion Attack
Instruction sets
Kernel
Metrics
microprocessor chips
ARM development board
multicore ARM processors
multicore ARM system
multicore computing security
Multicore processing
multiprocessing systems
normal world snapshot
normal-world evasion attack
biblio
Trust Me, My Neighbors Say It's Raining Outside: Ensuring Data Trustworthiness for Crowdsourced Weather Stations
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
crowdsourcing
cyber physical systems
pubcrawl
rainfall networks
reputation system
resilience
Resiliency
sensor networks
trust
Trustworthy Systems
biblio
MM: A New Framework for Multidimensional Evaluation of Search Engines
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
cyber physical systems
information retrieval
multidimensional search
pubcrawl
readability
resilience
Resiliency
retrieval evaluation
trustworthiness
Trustworthy Systems
understandability
biblio
Initial Trustworthiness Perceptions of a Drone System Based on Performance and Process Information
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
Compositionality
Computing Theory and Trust
cyber physical systems
human-automation trust
initial trust
perceived trustworthiness
pubcrawl
resilience
Resiliency
trusting beliefs
Trustworthy Systems
biblio
Federated Byzantine Agreement to Ensure Trustworthiness of Digital Manufacturing Platforms
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
consensus protocol
cyber physical systems
Distributed Ledger Technology
Federated Byzantine Agreement
pubcrawl
resilience
Resiliency
trustworthiness
Trustworthy Systems
biblio
Trust Based Security Solution for Internet of Things Healthcare Solution: An End-to-End Trustworthy Architecture
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
cyber physical systems
Healthcare
Internet of Things
pubcrawl
resilience
Resiliency
trust
Trustworthy Systems
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
biblio
Blind Channel Direction Separation Against Pilot Spoofing Attack in Massive MIMO System
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
MIMO communication
Vectors
Uplink
Trustworthy Systems
telecommunication security
signal space vector
Signal processing algorithms
signal processing
Resiliency
resilience
radiofrequency interference
pubcrawl
pilot spoofing attack scenario
pilot spoofing attack
partial channel state information
antennas
massive MIMO system
massive MIMO
malicious user
interference symbols
Europe
cyber physical systems
CSI
composability
channel estimation process
Channel estimation
blind source separation
blind channel separation
blind channel direction separation
base-station
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart contracts
Metrics
network accountability
open systems
Peer-to-peer computing
permissioned blockchain
Provenance
pubcrawl
resilience
Resiliency
IoT devices
Stakeholders
Trusted Computing
trustworthy orchestration
Trustworthy Systems
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
context dependent data analysis
blockchain
blockchain container based architecture
business network
Cloud Computing
cloud resources
composability
computer architecture
container based edge computing
Containers
accountability
cyber physical systems
data analysis
decentralized interaction model
EC infrastructures
edge computing
Internet of Things
Internet of Things devices
IoT based applications
« first
‹ previous
1
2
3
4
5
next ›
last »