Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trust models
biblio
Recommendation-based Security Model for Ubiquitous system using Deep learning Technique
Submitted by grigby1 on Fri, 03/17/2023 - 11:11am
Recommendation-based
Unfair recommendation
ubiquitous computing
Trust models
Sensitivity
Scalability
Resiliency
resilience
recommender systems
collaboration
pubcrawl
Human Factors
Human behavior
feature extraction
deep learning
control systems
Computational modeling
biblio
Trust based secure routing mechanisms for wireless sensor networks: A survey
Submitted by grigby1 on Wed, 08/10/2022 - 1:41pm
wireless sensor networks
Wireless Sensor Network
Trust Routing
Trust models
security
Secure Routing
Scalability
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Data models
Computational modeling
composability
attack
biblio
Liability-Aware Security Management for 5G
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
proof of transit
Trust models
trust and reputation models
transaction processing
telecommunication computing
security-by-contract
Security SLAs (SSLAs)
security of data
Root cause analysis
Resiliency
resilience
reputation models
Remote Attestation
pubcrawl
5G
orchestration decisions
network slicing
network accountability
multiple entities
Metrics
liability-aware security management
Liability
LASM
inherent distribution
composability
accountability mechanism
5G networks
5G mobile communication
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
Secure and Trust-aware Routing in Wireless Sensor Networks
Submitted by aekwall on Mon, 03/11/2019 - 9:35am
Scalability
Resiliency
pubcrawl
composability
wireless sensor networks
multipath routing
Secure Routing
Trust models
trust-based routing
Trust Routing
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Statistical Security Incident Forensics Against Data Falsification in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 03/05/2018 - 12:18pm
pubcrawl
Trust models
supervised learning
statistical anomaly detection
Smart Grid
security incident forensics
Scalability
Resiliency
resilience
relative entropy
advanced metering infrastructure
privacy
Metrics
information theory
information forensics
Human Factors
Human behavior
data falsification
Control Theory
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
event
9th International Workshop on Security and Trust Management (STM 2013)
Sep 09, 2013 12:00 am - Sep 13, 2013 12:00 am EDT
Submitted by Heather Lucas on Thu, 08/01/2013 - 5:54pm
9th International Workshop on Security and Trust Management (STM 2013)
in conjunction with ESORICS 2013
Networked systems security
Trustworthy systems and user devices
Trusted platforms
Trust models
Trust management policies
Trust in mobile code
Trust assessment and negotiation
Trust and reputation systems
privacy
Business process security and privacy
Legal and ethical issues
Identity management
E-services
Data/system integrity
Data protection
Data and application security
Complex systems security
2013
Workshop
Applied Cryptography
Economics of Security and Privacy
Access Control
Authentication
Database and Storage Security
Information Accountability and Usage Control
Formal Methods and Theory of Security
Digital Rights Management
Pseudonymity, Anonymity and Untraceability
Software and Application Security
Operating Systems Security
Systems Security