Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Internet of Vehi-cles(IoVs)

biblio

Visible to the public Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model

Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
  • security
  • MLBT evaluation model
  • particle swarm optimisation
  • Peer-to-peer computing
  • policy-based governance
  • Policy-Governed Secure Collaboration
  • pubcrawl
  • resilience
  • Resiliency
  • Scalability
  • Metrics
  • security solutions
  • security threats
  • Supervisory Control and Data Supervisory Acquisition (SCADA)
  • telecommunication security
  • Trusted Computing
  • VBM2M-C network
  • vehicular ad hoc networks
  • vehicular based M2M-C network
  • XGBoost model
  • Internet of Things (IoTs)
  • advsersary node detection
  • binary particle swarm optimization
  • Computational modeling
  • Entropy
  • entropy based feature engineering
  • extreme gradient boosting model
  • false trust
  • feature extraction
  • Human behavior
  • Adversary Models
  • Internet of Vehi-cles(IoVs)
  • learning (artificial intelligence)
  • machine learning
  • Machine Learning Based Trust (MLBT)
  • machine learning based trust evaluation model
  • machine-to-machine (M2M)
  • machine-to-machine communication
  • machine-to-machine communications
  • malicious activity detection

Terms of Use  |  ©2023. CPS-VO