Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust model
biblio
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute
Submitted by grigby1 on Fri, 09/30/2022 - 8:44am
process control
vector similarity algorithm
support algorithm
multi-service
multi-attribute
Resiliency
ICS Anomaly Detection
Resists
trust model
Resistance
Support vector machines
ICs
Protocols
Data models
Scalability
Analytical models
resilience
pubcrawl
Anomaly Detection
biblio
A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy
Submitted by grigby1 on Tue, 09/20/2022 - 2:12pm
similarity
false trust
entropy weight method
trust model
collaborative filtering
Resiliency
electronic commerce
KNN
recommender systems
Predictive models
Measurement
History
Entropy
Computational modeling
Scalability
resilience
policy-based governance
pubcrawl
biblio
Malicious Nodes Detection Scheme Based On Dynamic Trust Clouds for Wireless Sensor Networks
Submitted by grigby1 on Fri, 08/12/2022 - 2:25pm
uncertainty
trust model
Computers and information processing
cloud theory
trust evaluation
Computing Theory
trust
WSNs
simulation
Cloud Computing
composability
wireless sensor networks
Computational modeling
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Building And Measuring Trust In Human-Machine Systems
Submitted by grigby1 on Thu, 06/09/2022 - 2:56pm
Adaptation models
security
pubcrawl
Human behavior
Conferences
Buildings
Market research
autonomous systems
trust model
trust
human trust
Man-machine systems
human-machine systems
measuring trust
biblio
Towards Provenance-based Trust-aware Model for Socio-Technically Connected Self-Adaptive System
Submitted by grigby1 on Thu, 02/03/2022 - 4:17pm
provenance model
unmanned vehicles
trust model
Software
self-adaptive system
Robot Trust
Resiliency
resilience
requirements engineering
pubcrawl
Provenance
navigation
Human Factors
goal model
Conferences
Computational modeling
Analytical models
composability
Metrics
Human behavior
biblio
Trust Management in Smart Grid: A Markov Trust Model
Submitted by grigby1 on Tue, 11/30/2021 - 3:03pm
resilience
TV
trust model
smart grid security
Smart Grids
Smart Grid
security
Scalability
Resiliency
advanced metering infrastructure
pubcrawl
Numerical models
Metrics
Markov processes
Markov model
Cybersecurity
convergence
Computational modeling
biblio
Trust Evaluation Model for Cloud Security Using Fuzzy Theory
Submitted by aekwall on Tue, 06/01/2021 - 1:29pm
Computing Theory
trust
Cloud Computing
Cloud Security
cloud service provider
cloud service user
composability
Computing Theory and Trust
Fuzzy logic
Human Factors
pubcrawl
Resiliency
trust model
biblio
Design and Implementation of a Consensus Algorithm to build Zero Trust Model
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
distributed systems
zero trust model
zero trust
trust model
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Human Factors
Acoustic Fingerprints
distributed ledger
Distributed databases
data transfer
Data Security
Consensus algorithm
Conferences
Companies
blockchain
biblio
TIRL: Enriching Actor-Critic RL with non-expert human teachers and a Trust Model
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
human model
trust-based interactive task learning
TIRL
teacher demonstrations
sparse teaching signals
simulated teachers
sequential tasks
RL architecture
reinforcement learning algorithms
physical robots
nonexpert teachers
nonexpert human teachers
human teacher
learning (artificial intelligence)
attractive tools
actor-critic RL
actor-critic agent
human trust
Training data
teaching
computer aided instruction
trust model
optimal policy
pubcrawl
Human behavior
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
1
2
3
4
next ›
last »