Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dempster-Shafer Theory
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Effective Algorithm for Protecting WSNs from Internal Attacks in Real-time
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
Dempster-Shafer Theory
Human behavior
internal attacker
net work security
pubcrawl
Resiliency
Scalability
sensor security
wireless sensor network (WSN)
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 8:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
file
Prioritizing Intrusion Analysis Using Dempster-Shafer Theory
Submitted by Katie Dey on Tue, 10/30/2012 - 4:31pm. Contributors:
Loai Zomlot
Sathya Chandran
Xinming Ou
S. Raj Rajagopalan
Abstract--Intrusion
analysis,
i.e.
SaTC Posters
Dempster-Shafer Theory
Enterprise Network Security
HP Labs
Intrusion Detection and Analysis
Kansas State University
Reason about uncertainty
0954138
1018703
SaTC PI Meeting 2012
Academia
Industry
Poster