Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false trust
biblio
Adversarial Deception in Deep Learning: Analysis and Mitigation
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
predictive security metrics
Computational modeling
deep learning
false trust
Measurement
Mitigation strategy
Perturbation methods
policy-based governance
Predictive models
pubcrawl
Resiliency
Scalability
Speech recognition
targeted and untargeted adversarial attacks
Training
Trust and dependability risks in deep learning
biblio
Trust and Packet Loss Aware Routing (TPLAR) for Intrusion Detection in WSNs
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
computational intelligence
false trust
residual energy
MDR
FPR
Buffer Capacity
WSNs
Packet loss
Energy states
Intrusion Detection
Computational modeling
Routing
wireless sensor networks
policy-based governance
pubcrawl
Resiliency
Scalability
biblio
Deep Learning-Based False Sensor Data Detection for Battery Energy Storage Systems
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
convolutional neural network
false trust
sensor data fault
false data inject attack
Battery energy storage systems
state of charge
Circuit faults
convolution
Mathematical model
Scalability
Computational modeling
batteries
deep learning
policy-based governance
pubcrawl
Resiliency
Data models
biblio
Trust Evaluation for Securing Compromised data Aggregation against the Collusion Attack in WSN
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
network lifetime
false trust
tree
magnetic heads
Routing
Wireless Sensor Network
Base stations
cluster
sensors
base station
Scalability
Clustering algorithms
wireless sensor networks
data aggregation
policy-based governance
pubcrawl
Resiliency
security
architecture
biblio
Trust based Security framework for IoT data
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
IoT
Monitoring
Scalability
security
Resiliency
pubcrawl
policy-based governance
batteries
wireless sensor networks
delays
sensors
Temperature sensors
data aggregation
wireless sensor
false trust
biblio
A Trust-based Message Passing Algorithm against Persistent SSDF
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
cognitive radio
cooperative spectrum sensing
false trust
Libraries
malicious users
Mathematical model
message passing
policy-based governance
pubcrawl
radio transmitters
Reliability
Resiliency
Resists
Scalability
sensors
biblio
A Feedback-Driven Lightweight Reputation Scheme for IoV
Submitted by aekwall on Mon, 06/28/2021 - 12:30pm
Trust management
false trust
V2X
Internet of Vehicles(IoV)
Bogus Information Attack.
Information filters
vehicle dynamics
statistical analysis
reputation system
Scalability
VANET
internet
privacy
policy-based governance
pubcrawl
Resiliency
security
biblio
Blockchain Based Decentralized Trust Management framework
Submitted by aekwall on Mon, 06/28/2021 - 12:30pm
IoT
Scalability
Data models
Resiliency
pubcrawl
policy-based governance
wireless sensor networks
blockchain
Mathematical model
Markov processes
computer science
Trust management
malicious behavior
Proof of trust
false trust
biblio
Trust or Not?: A Computational Robot-Trusting-Human Model for Human-Robot Collaborative Tasks
Submitted by aekwall on Mon, 06/28/2021 - 12:30pm
robots
false trust
Injuries
computational model
robotics
Human Factors
collaboration
trust
human-robot interaction
Scalability
Computational modeling
policy-based governance
pubcrawl
Resiliency
Data models
Task Analysis
Big Data
biblio
A Trust-Based Security Scheme for 5G UAV Communication Systems
Submitted by grigby1 on Thu, 06/24/2021 - 10:51am
computer architecture
Unmanned Aerial Vehicles (UAVs)
Unmanned Aerial Vehicles
trust evaluation
simulation
security
resilience
Reliability
pubcrawl
policy-based governance
false trust
Pervasive Computing Security
composability
Communication Systems
Autonomic Security
5G mobile communication
5G communication
Metrics
Human Factors
Scalability
Resiliency
« first
‹ previous
1
2
3
4
5
6
next ›
last »