Behavior-Based Assessment of Trust in a Cyber-Physical System
暂无分享,去创建一个
[1] Sagit Valeev,et al. Safety System for Cyber-Physical Systems Based on Self-leaming Multiagent System , 2018, 2018 Eleventh International Conference "Management of large-scale system development" (MLSD.
[2] Andrei V. Gurtov,et al. TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL , 2017 .
[3] Timothy W. Finin,et al. CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[4] Elena Basan,et al. Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots , 2018 .
[5] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[6] Martín Barrère,et al. CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research , 2018, 2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA).
[7] Jinyuan You,et al. POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.
[8] Lei Zhang,et al. A security assessment scheme for interdependent cyber-physical power systems , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).
[9] Xingshe Zhou,et al. An Approach for Safety Analysis of Cyber-Physical System Based on Model Transformation , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[10] Sriram Sankaran,et al. Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).
[11] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.