Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust relationships
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
An Efficient Recommender System by Integrating Non-Negative Matrix Factorization With Trust and Distrust Relationships
Submitted by grigby1 on Mon, 10/05/2020 - 1:11pm
recommender system
user-item ratings
trust relationships
Task Analysis
Sparse matrices
social trust information
Social trust
social regularization method
security
Scalability
Resiliency
resilience
recommender systems
collaborative filtering
pubcrawl
optimization
nonnegative matrix factorization framework
MF-based recommenders
matrix factorization
Matrix decomposition
Linear programming
Human Factors
distrust relationships
convergence
computer theory
Complexity theory
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 3:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
recommender systems
unified framework
Trusted Computing
trust-aware recommender systems
trust relationships
trust directions
sparse users
Social network services
security of data
Scalability
Resiliency
resilience
Adaptation models
recommendation quality
pubcrawl
Mathematical model
learning (artificial intelligence)
learn directive trust strength
Human Factors
Data models
Computational modeling
cold start
adaptive systems
adaptive method
biblio
Security and trust for surveillance cameras
Submitted by K_Hooper on Wed, 02/28/2018 - 10:32am
abstract vulnerabilities
attacks
Cameras
commercial IP camera
Compositionality
Feeds
IP networks
pubcrawl
security
security of data
standards
surveillance
surveillance cameras
telecommunication security
trust relationships
video surveillance