Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trusted Computing
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
Digitized Trust in Human-in-the-Loop Health Research
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Artificial Intelligence
human-in-the-loop health research
human researchers
digitized trust
data transformations
collaborative health research environments
AI systems
human trust
Human behavior
hospitals
security of data
groupware
Pipelines
data privacy
blockchain technology
collaboration
trustworthiness
pubcrawl
computer architecture
Trusted Computing
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
A Trust Logic for Pre-Trust Computations
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
Human behavior
human trust
trust logic
subjective logic
social systems
pre-trust computations
logical language
JØsang Subjective Logic
formal languages
computational trust model
computational trust
security of data
formal logic
Semantics
Syntactics
Feeds
uncertainty
social networking (online)
Computational modeling
pubcrawl
Trusted Computing
security
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 11:27am
Traffic Management
Intelligent Data and Security
Intelligent Data Security
sustainable adoption
Security Classification
security approaches
multitier ITS security framework
ITS trust challenges
coherent reference architecture
business intelligence development
Big Data security frameworks
reference architecture
big data technologies
Intelligent Transportation Systems
Intelligent Transportation System
Scalability
Compositionality
Logic gates
Data processing
authentication
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Trusted Computing
Internet of Things
Big Data
authorization
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »