Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trusted nodes
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Trust Degree Calculation Method Based on Trust Blockchain Node
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
blockchain network node mobility
peer to peer security
trustworthiness calculation method
trust value evaluation indicators
trust degree calculation method
Trust calculation
trust blockchain node
Trust blockchain
transaction delay
P2P network trust value calculation
node working state
node transaction
node behavior information
delays
decentralized P2P network
computer network security
blockchain network node diversity
blockchain network environment security
trusted node
transaction processing
Human Factors
Scalability
Metrics
trusted nodes
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
Cryptography
biblio
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
Submitted by willirn1 on Thu, 05/30/2019 - 2:57pm
r-robustness
robust graphs
dominating sets
Complexity theory
Measurement
Redundancy
resilience
control systems
Robustness
networked system control
robust network construction
telecommunication control
fundamental metrics
failure-prone circumstances
resilient consensus
network structure
network connectivity
network robustness
structural robustness
trusted nodes
telecommunication network reliability
Vanderbilt
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV