Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Compositionality
biblio
Area Constraint Aware Physical Unclonable Function for Intelligence Module
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
area constraint aware physical unclonable function
area constraint aware PUF
artificial intelligence technology
Artificial Neural Networks
authentication
authentication techniques
circuit area
composability
Compositionality
computational intelligence
Cryptography
edge computing
field programmable gate arrays
Hamming distance
Hardware
Hardware Security
intelligence module
IoT devices
neural network
Neurons
NN
Physical Unclonable Function
physical unclonable functions
pubcrawl
PUF performance evaluation
security countermeasures
security of IoT device
Table lookup
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
application design decisions
CI users
composability
Compositionality
computational intelligence
computational intelligence libraries
computational intelligence software design automation framework
computational intelligence techniques
Cryptography
expert system
expert systems
language compatibility
learning (artificial intelligence)
Libraries
machine learning
machine learning domains
MeetCI
open source software framework
pubcrawl
public domain software
recurrent neural nets
Recurrent neural networks
Security Evaluation
Software
Software algorithms
Software design automation
software engineering
software implementation process
specific supported functionality
tools
XML
XML file
biblio
Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
Artificial Intelligence
composability
Compositionality
computational intelligence
Computational modeling
computer network security
computer networks security
Cryptography
cyber defense
Fuzzy logic
hybrid methods
intrusion detection system
Intrusion Detection Systems
intrusion prevention system
IP networks
Monitoring
multi-agent systems
multiagent systems
network and information security
optimization
pubcrawl
Reinforcement learning
security
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by
grigby1
on Mon, 12/09/2019 - 1:01pm
Artificial Intelligence
CI techniques
composability
Compositionality
computational intelligence
Cryptography
evolutionary computation
groupware
knowledge based systems
maritime domain
military computing
NATO Nations
neural nets
Oceans
pubcrawl
review CI applications
security
Security & Defense applications
simulated annealing
Training
biblio
Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks
Submitted by
aekwall
on Mon, 12/09/2019 - 11:24am
security
pubcrawl
composability
wireless sensor networks
trust
self-healing
Compositionality
Computing Theory and Trust
biblio
A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure
Submitted by
aekwall
on Mon, 12/09/2019 - 11:24am
Conferences
Trusted Computing
nearest neighbour methods
pubcrawl
composability
collaborative filtering
Prediction algorithms
clustering
Clustering algorithms
collaboration
pattern clustering
Heuristic algorithms
clustering algorithm
Compositionality
cold start
data sparsity
heuristic similarity
hybrid collaborative filtering recommendation algorithm
K nearest neighbor recommendation
Matrix decomposition
multiple similarity influence factors
recommedation algorithm
recommendation list
recommender systems
similarity measure
SIMT collaborative filtering algorithm
trust measure
trust model
trust propagation theory
user trust network
user trust relationship computing model
Weight measurement
Computing Theory and Trust
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by
aekwall
on Mon, 12/09/2019 - 11:24am
security
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
Computational modeling
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
cluster formation game
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
illegitimate sensor nodes
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
biblio
A preliminary approach towards the trust issue in cloud manufacturing using grounded theory: Defining the problem domain
Submitted by
aekwall
on Mon, 12/09/2019 - 11:23am
Bibliographies
Buildings
Cloud Computing
cloud manufacturing
cloud manufacturing trust
collaboration
composability
Compositionality
Computing Theory and Trust
grounded theory
grounded theory method approach
information management
integrative phase
manufacturing
noncommittal phase
production engineering computing
pubcrawl
structured literature review
supply chains
trust
trust issue
trust topic
Trusted Computing
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by
aekwall
on Mon, 12/09/2019 - 11:23am
security of data
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
Decision Making
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
adaptive weight
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
relation-based trust
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by
aekwall
on Mon, 12/09/2019 - 11:23am
Conferences
Trusted Computing
pubcrawl
composability
wireless sensor networks
Decision Making
Correlation
mobile radio
telecommunication computing
sensors
Compositionality
beta-trust
cleaning
context-aware
data handling
data imprecision
diversified trust portfolio
DTP
financial markets theory
Mobile wireless sensor networks
MWSN
online context-aware data cleaning method
online data cleaning
Portfolios
sensor data accuracy trustworthiness
spatially autocorrelated candidate sensors
Trajectory
trust diversification
Computing Theory and Trust
1
2
3
4
5
6
7
8
9
…
next ›
last »