Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trustworthiness
biblio
Verifying Accountability for Unbounded Sets of Participants
Submitted by grigby1 on Wed, 08/03/2022 - 3:12pm
pubcrawl
Protocols
verification
composability
computer security
accountability
trustworthiness
formal-methods
electronic voting
Security-Protocols
biblio
Trustworthiness Evaluation of Smart Grids Using GSPN
Submitted by grigby1 on Wed, 08/03/2022 - 3:12pm
pubcrawl
security
Stochastic processes
composability
sensors
Smart Grids
integrity
simulation
Petri nets
Reliability
Substations
trustworthiness
Steady-state
Availability
GSPN
biblio
Trustworthiness Derivation Tree: A Model of Evidence-Based Software Trustworthiness
Submitted by grigby1 on Wed, 08/03/2022 - 3:12pm
pubcrawl
Conferences
composability
cognition
visualization
software reliability
Software systems
trustworthiness
software quality
Evidence
Refinement
Skeleton
biblio
Assurance for CyberPhysical Systems: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things
Submitted by grigby1 on Mon, 11/08/2021 - 12:49pm
assurance case
composability
cyberphysical
cyber physical security
cyber physical systems
devsecops
Evidence
IoT
pubcrawl
resilience
Resiliency
Software
Supply Chain
trustworthiness
Trustworthy Systems
biblio
Securely Taking on New Executable Software Of Uncertain Provenance
Submitted by willirn1 on Tue, 10/26/2021 - 5:39pm
Software
automation
risk mitigation
security
Cybersecurity
software vulnerabilities
C3E
trustworthiness
biblio
Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework
Submitted by grigby1 on Thu, 05/13/2021 - 1:09pm
attestation
composability
computer architecture
Hardware
Human behavior
Monitoring
network function virtualization
pubcrawl
Remote Attestation
resilience
Resiliency
security
service function chain
Software
software reliability
trustworthiness
biblio
A Systematic Way to Implement Private Tor Network with Trusted Middle Node
Submitted by grigby1 on Tue, 04/27/2021 - 1:15pm
Metrics
trustworthiness
Trusted Middle Node
trust
sockets
Servers
Resiliency
resilience
Random access memory
pubcrawl
Private Tor Network (PTN)
Physical Free Memory
Web Browser Security
Live Tor Network (LTN)
IP networks
Human behavior
Free CPU Time
Cryptography
CpuCount
CPU Percentage
Compositionality
Central Processing Unit
Browsers
Browser Security
biblio
A General Approach to Assessing the Trustworthiness of System Condition Prognostication
Submitted by aekwall on Mon, 12/21/2020 - 12:36pm
discrete times
total error probability
system condition prognostication
system condition prognosis
probabilities
Preventive maintenance
predictive checking
posteriori probability
possible decisions
mutually exclusive events
incorrect decisions
general expressions
failure-free operation
effectiveness indicators
pubcrawl
correct decisions
average operating costs
Mathematical model
maintenance engineering
Stochastic processes
failure analysis
error statistics
trustworthiness
probability
condition monitoring
predictive maintenance
composability
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 12:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »