Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reputation system
biblio
Blockchain Integration with end-to-end traceability in the Food Supply Chain
Submitted by grigby1 on Thu, 01/05/2023 - 1:29pm
supply chains
decentralized application
supply chain security
food security
Food industry
Supply Chain
blockchains
Traceability
reputation system
automation
blockchain
smart contracts
Performance analysis
Reliability
Computational modeling
authentication
Resiliency
resilience
pubcrawl
biblio
A Feedback-Driven Lightweight Reputation Scheme for IoV
Submitted by aekwall on Mon, 06/28/2021 - 11:30am
Trust management
false trust
V2X
Internet of Vehicles(IoV)
Bogus Information Attack.
Information filters
vehicle dynamics
statistical analysis
reputation system
Scalability
VANET
internet
privacy
policy-based governance
pubcrawl
Resiliency
security
biblio
Self-organization of Network Communities via Blockchain Technology: Reputation Systems and Limits of Digital Democracy
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
reputation systems
network members reputation
Oracle
organisational aspects
political institutionalization
politics
pubcrawl
public accountability
reputation assessment system
reputation system
network communities reputation
resilience
Resiliency
security of data
self-organization
social networking (online)
tools
traditional reputation systems
virtual network communities
Economics
blockchain technology
blockchain-based reputation system
blockchain-oracles
civil society
composability
data privacy
digital democracy
digital technologies
blockchain
Games
Government
government control
government data processing
internet
Metrics
multi-agent systems
network accountability
biblio
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
Submitted by grigby1 on Wed, 02/10/2021 - 12:13pm
Peer-to-peer computing
uses Quality
Threat intelligence sharing
reputation system
reputation estimation scheme
Open Cloud testbed
distributed trust
DefenseChain system
DefenseChain implementation
cyber threat intelligence sharing
cloud-hosted applications
blockchain platform
attack mitigation
Cryptography
Cyber Attacks
Attack detection
Cloud Computing
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Distributed databases
blockchain
cyber security
biblio
A Reputation Management Framework for MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
pubcrawl
trusted mobile ad hoc networks
Trusted Computing
trust information
security of data
Resiliency
resilience
reputation system
reputation management system
attack
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs
manet privacy
malicious information
malicious attacks
Compositionality
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 10:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
Trust Me, My Neighbors Say It's Raining Outside: Ensuring Data Trustworthiness for Crowdsourced Weather Stations
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
composability
crowdsourcing
cyber physical systems
pubcrawl
rainfall networks
reputation system
resilience
Resiliency
sensor networks
trust
Trustworthy Systems
biblio
Preventing Collusion between SDN Defenders Anc Attackers Using a Game Theoretical Approach
Submitted by grigby1 on Tue, 02/06/2018 - 1:05pm
preventing collusion
software defined networking
socio-rational approach
Silicon
SDN defenders
SDN controller
Resiliency
reputation system
repeated-game setting
Reconnaissance
pubcrawl
anti-collusion solution
Network reconnaissance
Games
game-theoretical solution concept
game theory
game theoretical approach
control systems
Conferences
computer network security
Computer crime
collusion attack