Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust model
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 11:33am
inference mechanisms
Expert Systems and Privacy
trust mechanisms
trust inference
trust computation
personality models
online human-fed evaluation systems
nonpersonality-wise approaches
malicious people
logical protection
evaluation system
affective aspects
psychology
trust model
Numerical models
security of data
Software systems
Human Factors
Data mining
Correlation
text analysis
Decision Making
tools
Computational modeling
pubcrawl
Human behavior
Data models
Trusted Computing
data privacy
Scalability
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
Fuzzy-GRA Trust Model for Cloud Risk Management
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
gray relational theory
Trusted Computing
trust model
Software
security vulnerabilities
security of data
security
risk management
pubcrawl
Peer-to-peer computing
Mathematical model
local trust model
grey systems
Adaptation models
gray relational analysis
global trust model
Fuzzy-GRA trust model
fuzzy set theory
fuzzy mathematics
Computer Theory and Trust
Computational modeling
Compositionality
composability
cloud safety
cloud risk management
Cloud Computing
biblio
A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Privacy.
Trusted Computing
trust model
trust computation
trust
telecommunication security
similarity model
similarity
sensors
security
Resiliency
resilience
Reliability
Recommendations
pubcrawl
Cloud Computing
mitigate badmouthing attacks
Metrics
malicious object
IoT security
IoT networks
IoT
Internet of Things
Human Factors
Human behavior
Data models
Computational modeling
composability
Collusion Attacks
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 11:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Secure and Composite Routing Strategy through Clustering In WSN
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
composability
data trust
Malicious Detection Rate
network lifetime
pubcrawl
Scalability
Social trust
trust model
Trust Routing
Wireless Sensor Network
biblio
An Efficient Two-Server Password-Only User Authentication for Consumer Electronic Devices
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
Protocols
two-server password-only remote user authentication protocol
trust model
telecommunication security
SSL Trust Models
SSL
Smartphones
Servers
secure socket layer protocol
Scalability
Resiliency
resilience
pubcrawl
authentication
password
Metrics
message authentication
laptops
impersonation attacks
Human Factors
Human behavior
dictionary attacks
Dictionaries
Cryptographic Protocols
Consumer electronics
consumer electronic devices
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
SIMT collaborative filtering algorithm
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
heuristic similarity
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
Conferences
data sparsity
cold start
Compositionality
clustering algorithm
Heuristic algorithms
pattern clustering
collaboration
Clustering algorithms
clustering
Prediction algorithms
collaborative filtering
composability
pubcrawl
nearest neighbour methods
Trusted Computing
« first
‹ previous
1
2
3
4
next ›
last »