Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Privacy.
Trusted Computing
trust model
trust computation
trust
telecommunication security
similarity model
similarity
sensors
security
Resiliency
resilience
Reliability
Recommendations
pubcrawl
Cloud Computing
mitigate badmouthing attacks
Metrics
malicious object
IoT security
IoT networks
IoT
Internet of Things
Human Factors
Human behavior
Data models
Computational modeling
composability
Collusion Attacks
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
blockchain
decentralize
Deterrence
federated learning
Human behavior
incentive
pubcrawl
resilience
Resiliency
Scalability
trust
biblio
A Trust-based Real-time Map Updating Scheme
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
fog node
privacy
Policy-Governed Secure Collaboration
policy-based governance
message source vehicle
malicious vehicles
Internet of Vehicles
high-precision map service
Global Positioning System
pubcrawl
false trust
data privacy
blockchain
Bayesian inference model
automatic driving
anonymity
accurate traffic information
Scalability
trust
traffic information systems
timely traffic information
telecommunication traffic
Sybil attack prevention
Servers
security of data
Security analysis
trust value offset
Roads
road condition information
Resiliency
resilience
real-time systems
real-time map updating
Public key
biblio
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
traffic engineering computing
road accidents
road safety
road traffic
Roads
safe transportation
Scalability
security of data
substantial relevance
substantial traffic congestions
telecommunication traffic
Resiliency
traffic information
traffic simulation model
transmitted messages
trust
trusted autonomous vehicle
trustworthiness
VANET
vehicle dynamics
vehicle trust measurement
vehicular ad hoc networks
measuring trust
autonomous vehicle
AV
different OBU components
Driverless Car
extremely dynamic topographical conditions
false information
false trust
Global Positioning System
GPS data
Intelligent Transportation System
Autonomous automobiles
misleading information
On Board Unit
on-board unit components
on-board unit data
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
realistic traffic data
Reliability
resilience
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »