Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trustworthiness
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
Attack detection
trust value security
time 0.5518318 s
PHP database
On-offAttack
on-off attack
Object
MySQL database
trustworthiness management
IoT object security
MQTT
security of data
Topology
trustworthiness
network topology
authentication
SQL
Databases
composability
pubcrawl
Internet of Things
Servers
biblio
Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
Configurability
utility calculation
trustworthy operation
trustworthiness profiles
profile
modular model
modular extensible approach
Industrial IoT
Industrial Internet Security Framework
industrial internet consortium
dynamically evaluable form
dynamic evaluation
dynamic assessment
cross-company Industry
computer network security
behaviour-based context-based
automatically verifiable operations
automatable trust models
regulatory requirements
trustworthiness
production engineering computing
supply chain management
supply chains
Metrics
composability
pubcrawl
Trusted Computing
Internet of Things
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
information and communication technology
trustworthiness
Trusted Computing
trust
sensors
security threats
security
secure operation
pubcrawl
Peer-to-peer computing
Nash Equilibrium
Mathematical model
game theoretic security
information and communication technologies
ICT
Games
game-theoretic approach
game theory
cyber-physical systems
CPS sensor nodes
composability
Predictive Metrics
Scalability
Human Factors
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
trust evaluation
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
energy management
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
Measurement
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Cryptography
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 11:33am
cloud-based framework
trustworthy cloud services
software-based
software toolkit
service concepts
privacy regulations
PRIVAaaS
MAPE-K control loop
MAKE-K
good option
feedback control loop
deployment environment
data leakages
Cloud Computing
cloud systems
ATMOSPHERE Platform
privacy violations
cloud
trustworthiness
risk assessment
feedback
privacy
composability
pubcrawl
Trusted Computing
data privacy
biblio
Trustworthiness Estimation of Entities within Collective Perception
Submitted by aekwall on Mon, 12/07/2020 - 11:32am
vehicular ad hoc network
vehicles awareness
vehicle shares information
V2X communication
remote vehicle
Misbehavior detection
host vehicle
entities trustworthiness estimation
collective perception information
Collective perception
Bayes filter
vehicle dynamics
data consistency
Radar
Intelligent Transportation Systems
road safety
situational awareness
estimation
sensors
VANET
sensor fusion
trustworthiness
Probabilistic logic
Reliability
vehicular ad hoc networks
composability
pubcrawl
Trusted Computing
telecommunication security
Conferences
biblio
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification
Submitted by aekwall on Mon, 12/07/2020 - 11:32am
pattern classification
security-critical tasks
neural network system
neural network classification
adversarial settings
adversarial attack detection
adversarial examples
Perturbation methods
trustworthiness
machine learning model
machine learning
security of data
Neural networks
neural nets
Statistics
Sociology
Computational modeling
composability
pubcrawl
learning (artificial intelligence)
Trusted Computing
Task Analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »