Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false trust
biblio
Detecting Malicious Authentication Events Trustfully
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
resilience
malicious authentication event detection
malicious class
pattern classification
policy-based governance
Predictive models
pubcrawl
random forest model
regression analysis
Los Alamos dataset
Resiliency
Scalability
security logs
supervised learning technique
Trusted Computing
trustful predictions
ultimately majority voting model
false trust
authentication
authentication event
Bipartite graph
collaboration
Computational modeling
false attacks
false negative rate
false positive rate
Anomaly Detection
feature extraction
Forestry
learning (artificial intelligence)
legitimate user behavior
logistic regression model
Logistics
LogitBoost model
biblio
Truth-Aware Optimal Decision-Making Framework with Driver Preferences for V2V Communications
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
Trusted Computing
pubcrawl
reported road events
resilience
Resiliency
Roads
Safety
Scalability
sensors
trust-aware decision-making framework
policy-based governance
truth-aware optimal decision-making framework
utility maximization framework
V2V communications
vehicle-to-vehicle communications
vehicles
vehicular ad hoc networks
vehicular traffic stream
verifiable transmitter
false data
appropriate human preference factors
Bayes rule
collaboration
data trustworthiness
Decision Making
decision-making process
Dempster Shafer Theory
event belief
Accidents
false information
false trust
incorporate driver preferences
Intelligent Transportation System
Intelligent Transportation Systems
malicious actors
multiple-vehicle attack
optimal action
biblio
Trust-Based Framework for Resilience to Sensor-Targeted Attacks in Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
sensor-targeted attacks
Observers
policy-based governance
primary sensor
process control
process state
pubcrawl
resilience
Resiliency
Safety
Scalability
security
networked control systems
sensors
Silicon
stability
standard protocols
state estimates
state estimation
trust-based framework
Trusted Computing
weighted consensus
wireless sensor networks
false trust
closed loop systems
closed-loop control
collaboration
communication infrastructure
compromised sensors
computer network security
cyber-physical plants
cyber-physical systems
entire plant
false data injections
CPS resilience
far-flung locations
feedback
feedback signal
interconnected processes
local data
local process
malicious agents
Measurement
Monitoring
multisensor networked physical experiment
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
Cyber Security and Vulnerability Analysis of Networked Control System Subject to False-Data Injection
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
Networked Control System
vulnerability level
Vulnerability Analysis
sensors
security of data
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
networked control systems
networked control system cyber security
Networked Control Systems Security
NCS
Monitoring
malicious outsiders
geometric approach
false-data injection
false trust
false data injection attacks
controlled system
control engineering computing
Computer hacking
collaboration
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
DoSE: Deobfuscation Based on Semantic Equivalence
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
code cloning
collaboration
control-flow graph
deobfuscation
false trust
Malware Analysis
obfuscation
opaque predicate
policy-based governance
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Symbolic Execution
biblio
Tree-Based Classification to Users' Trustworthiness in OSNs
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
collaboration
Data mining
false trust
machine learning
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
social media
trust
Twitter
users' trustworthiness
biblio
A Trust-Based Framework for Internet Word of Mouth Effect in B2C Environment
Submitted by grigby1 on Mon, 08/05/2019 - 10:34am
collaboration
false trust
Internet Word Of Mouth
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
SOR model
trust
« first
‹ previous
1
2
3
4
5
6
next ›
last »