Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust model
biblio
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
trust model
Trust Management.
TCP SYN flooding attacks
security of data
security mechanisms
security
Resiliency
resilience
Receivers
pubcrawl
packet dropping attacks
Anomaly Detection
intrusion detection system
Intrusion Detection
Fuzzy logic
distributed denial of service attacks
distributed denial of service
denial-of-service attack
denial of service
counter-security issues
computer resources
Computer crime
biblio
A trust-based security enforcement in disruption-tolerant networks
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
security enforcement
mobile computing
network participants
Peer-to-peer computing
privacy
pubcrawl
Routing protocols
security
security credentials
Medical services
security of data
subjective logic
telecommunication security
trust model
trust-based security enforcement
Trusted Computing
uncertainty
web of trust
delay tolerant networks
authentication
authorisation
central trusted entity
centralised trusted authorities
composability
Compositionality
computational intelligence
Cryptography
attribute-based access control
Delay-tolerant networks
delays
disruption- and delay-tolerant networks
disruption-tolerant networks
DTN
high packet drop rates
long delays
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
GA Based Parameter Estimation for Multi-Faceted Trust Model of Recommender Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:55pm
recommender systems
web of trust
user trust network
trust network
trust model
Statistics
Sociology
social networks
social networking (online)
root mean squared of prediction error
RMSE
Resiliency
resilience
collaboration
pubcrawl
parameter estimation
optimization
multifaceted trust model
multi-faceted trust network
mean square error methods
genetic algorithms
genetic algorithm
GA
Epinions data set
composability
collaborative filtering
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
biblio
Understanding the Influence and Service Type of Trusted Third Party on Consumers' Online Trust: Evidence from Australian B2C Marketplace
Submitted by grigby1 on Wed, 08/02/2017 - 1:52pm
B2C
composability
credit publicity
credit transmission
pubcrawl
Resiliency
service type
trust model
trust problem
trusted third party
web of trust
biblio
Continuous Authentication in a real world settings
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
trust model
Software
pubcrawl170115
Presses
periodic authentication
Mouse Dynamics
Mice
Mathematical model
authentication
feature extraction
data collection software
continuous authentication system
Continuous Authentication
Computers
computer input devices
behavioural biometrics
authorisation
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 12:56pm
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
« first
‹ previous
1
2
3
4
next ›
last »