Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
A trust model based on evidence-based subjective logic for securing wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
resilience
WMN
wireless mesh networks
Wireless Mesh Network Security
watchdog detection mechanism
uncertainty
telecommunication security
telecommunication network routing
telecommunication network management
security threats
security
secure route discovery
Bayes methods
recommendation trust information model
pubcrawl
Metrics
Mathematical model
gray-hole attacks
evidence-based subjective logic
Entropy
EBSL
Computational modeling
composability
black-hole attacks
biblio
Modelling and evaluating failures in human-robot teaming using simulation
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resource management
Work Models that Compute
work factor metrics
Teamwork
team working
team performance
team designers
Task Analysis
space EVA operations
Scalability
robots
robotic capabilities
robot failures
aerospace robotics
Resiliency
resilience
pubcrawl
multi-robot systems
human-robot teams
human-robot teaming
human-robot interaction
fault tolerance
failure evaluation
Extraterrestrial measurements
computational simulation
Computational modeling
biblio
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
Internet of battlefield things
wireless networks
war scenarios
telecommunication security
sensors
Scalability
Resiliency
resilience
pubcrawl
Poisson point process
mission-critical data
military communication
iobt
Internet of Things
Ad hoc networks
information dissemination
Human Factors
Geometry
Epidemics
Decision Making
critical information dissemination
coordinated decision-making
Computational modeling
combat efficiency
Biological system modeling
Battlefield
Analytical models
biblio
Agent based simulation of a payment system for resilience assessments
Submitted by grigby1 on Mon, 12/03/2018 - 1:52pm
Metrics
Swedish payment system
supply chain risk assessment
Supply Chain
Scalability
Resiliency
resilience assessments
resilience
pubcrawl
Petroleum
payment system
Online banking
multi-agent systems
Agent based modeling
gaming simulation approach
gaming simulation
Games
fuel retailing
food retailing
financial data processing
digital simulation
computer games
computer based role playing game
Computational modeling
Analytical models
agent based simulation
biblio
The Method of Expert Evaluation of Airports Aviation Security Using Perceptual Calculations
Submitted by grigby1 on Wed, 11/14/2018 - 1:20pm
restricted areas protection
Linguistics
perceptual calculations
perceptual computer
Personnel
proactive control
pubcrawl
resilience
Resiliency
intruders
Scalability
SCAUI elements
SCAUI state control
system of counteraction to acts of unlawful interference
technical systems
type-2 fuzzy sets
uncertainty
unlawful interference
AS employees
security
acts of unlawful interference
aircraft safety
airport
airport AS
airport security
Airports
airports aviation security
expert systems
Atmospheric modeling
aviation security
Computational modeling
expert evaluation
expert quality assessment
functional state
Fuzzy sets
Human behavior
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 5:05pm
Games
undesirable CSPs
security risk levels
security risk avoidance
security risk assessment
security of data
security
Scalability
risk management
quality of service
pubcrawl
online Cloud federation formation
Metrics
insecure CSPs
Human Factors
hedonic coalitional game
Cloud Computing
game theory
game theoretic security
federation formation algorithm
federated Cloud service
cooperative game
Computational modeling
coalitional game
cloud service providers
Cloud Security
Cloud federations
Cloud federation formation process
Cloud federation formation model
cloud federation
cloud environments
biblio
Security and privacy for IoT and fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
heterogeneous ecosystem
Trust management
smart objects
security challenges
Scalability
risk-based trust management model
Resiliency
pubcrawl
Protocols
privacy issues
privacy
IoT
Internet of Things
human privacy
authentication
fog computing paradigm
Fog Computing and Security
Fog computing
edge computing
distributed processing
Data Security
data privacy
computing clouds
computer network security
Computational modeling
Cloud Computing
cameras etc
biblio
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
mobile computing
healthcare facilities
healthcare information system environment
high-profile attacks
medical control systems
medical data
medical devices
medical information systems
Medical services
healthcare cloud-lets
mobile services
Protocols
pubcrawl
Resiliency
Scalability
security
security of data
Service Provisioning
edge computing
autonomic zero-knowledge security provisioning model
AZSPM
Cloud Computing
cloud-based solutions
cloud-hoarding
Computational modeling
cyber security
different healthcare enterprises
atomic security components
Fog computing
FOG computing environment
fog environments
fog security administration
fully sand boxed environment
health care
health informatics industry
Health Information Systems
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
…
next ›
last »