Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Trusted Computing
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
security of data
distributed processing
security
Trusted Computing
Resiliency
pubcrawl
composability
Sybil attack
graph theory
sybil attacks
Image edge detection
network topology
edge computing
Predictive Metrics
social networking (online)
Sensitivity
trust model
heterogeneous devices
attack graphs
aerospace industry
detection performance
graph preprocessing
graph processing
graph transformations
graph-based sybil detection
prominent security problems
refined graph structure
social structures
target distributed systems
trust mechanism
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 12:36pm
IoT
computer network security
Servers
encryption
Internet of Things
Cryptographic Protocols
Protocols
Trusted Computing
pubcrawl
composability
blockchain
data analysis
secure protocol
trustworthiness
Relays
Data Transmission
smart cities
Artificial Intelligence
digital signatures
IoT device
TEE
artificial intelligence technology
Trusted Execution Environment
data trustworthiness
AI technology
authenticated encryption method
blockchain ledger
data analysis methods
physically unclonable function
trusted hardware
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
attestation
channel attackers
client DNS queries
composability
computer network security
Cryptographic Protocols
data privacy
encryption
encryption protocol
hybrid protocol
initialization process
Intel SGX
internet
Internet infrastructure
IP networks
obfuscation protocol
privacy
privacy preservation
Protocols
pubcrawl
server attackers
Servers
service proxy
T2DNS
Third-Party DNS
third-party DNS service
Trusted Computing
trustworthiness
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
IoT
security of data
data integrity
Trusted Computing
pubcrawl
composability
Peer-to-peer computing
Correlation
Data mining
trustworthiness
Indexes
sensor fusion
Temperature measurement
Gaussian processes
sensor networks
reputation
Time series analysis
Autonomous Sensors
correlation theory
Gaussian overlap
geophysics computing
Meteorology
Meteorology Data
Pearson correlation
peer-data trust
reputation indicators
reputation-based method
self-data trust
soft-security feature
trustworthiness approach
weather stations
biblio
Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
computer network security
Internet of Things
Trusted Computing
pubcrawl
composability
Metrics
supply chains
supply chain management
production engineering computing
trustworthiness
regulatory requirements
automatable trust models
automatically verifiable operations
behaviour-based context-based
Configurability
cross-company Industry
dynamic assessment
dynamic evaluation
dynamically evaluable form
industrial internet consortium
Industrial Internet Security Framework
Industrial IoT
modular extensible approach
modular model
profile
trustworthiness profiles
trustworthy operation
utility calculation
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
security
Trusted Computing
game theory
cyber-physical systems
pubcrawl
composability
Peer-to-peer computing
trust
Mathematical model
trustworthiness
security threats
information and communication technology
Games
sensors
Nash Equilibrium
game-theoretic approach
ICT
secure operation
CPS sensor nodes
information and communication technologies
biblio
An Augmented Bayesian Reputation Metric for Trustworthiness Evaluation in Consensus-based Distributed Microgrid Energy Management Systems with Energy Storage
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
Cryptography
Trusted Computing
Bayes methods
pubcrawl
composability
batteries
multi-agent system
multi-agent systems
Cybersecurity
Measurement
trustworthiness
power engineering computing
power system security
Indexes
distributed power generation
energy management systems
Microgrids
Attack detection
energy management
Energy storage
control engineering computing
estimation
resilience
distributed control
Consensus
cyber-physical system
microgrid
trust evaluation
agent trustworthiness
augmentation method
augmented Bayesian reputation metric
consensus-based distributed microgrid energy management systems
difficult-to-detect attack patterns
Energy Management System
real-time HIL microgrid testbed
Trustworthiness Evaluation
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:33pm
Cloud Computing
authorisation
data privacy
Organizations
Trusted Computing
pubcrawl
composability
blockchain
cryptocurrencies
Distributed databases
trustworthiness
ethereum
Virtual machining
contracts
edge computing
Prototypes
blockchain-based approach
cloud-based prototype
data trustworthiness
global trustworthiness
Isolated data islands
malicious falsification attacks
multiple-domain business partners
trusted corporations
trustworthiness gap
trustworthiness management
trustworthiness-protection system
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 11:33am
Cloud Computing
data privacy
Trusted Computing
pubcrawl
composability
privacy
feedback
risk assessment
trustworthiness
cloud
privacy violations
ATMOSPHERE Platform
cloud systems
cloud-based framework
data leakages
deployment environment
feedback control loop
good option
MAKE-K
MAPE-K control loop
PRIVAaaS
privacy regulations
service concepts
software toolkit
software-based
trustworthy cloud services
biblio
Trustworthiness Estimation of Entities within Collective Perception
Submitted by aekwall on Mon, 12/07/2020 - 11:32am
road safety
Conferences
telecommunication security
Trusted Computing
pubcrawl
composability
vehicular ad hoc networks
Reliability
Probabilistic logic
trustworthiness
sensor fusion
VANET
sensors
estimation
situational awareness
vehicular ad hoc network
Intelligent Transportation Systems
Radar
data consistency
vehicle dynamics
Bayes filter
Collective perception
collective perception information
entities trustworthiness estimation
host vehicle
Misbehavior detection
remote vehicle
V2X communication
vehicle shares information
vehicles awareness
1
2
3
4
5
6
7
8
9
…
next ›
last »