Behavior-Based Assessment of Trust in a Cyber-Physical System

[1]  Sagit Valeev,et al.  Safety System for Cyber-Physical Systems Based on Self-leaming Multiagent System , 2018, 2018 Eleventh International Conference "Management of large-scale system development" (MLSD.

[2]  Andrei V. Gurtov,et al.  TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL , 2017 .

[3]  Timothy W. Finin,et al.  CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.

[4]  Elena Basan,et al.  Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots , 2018 .

[5]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[6]  Martín Barrère,et al.  CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research , 2018, 2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA).

[7]  Jinyuan You,et al.  POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.

[8]  Lei Zhang,et al.  A security assessment scheme for interdependent cyber-physical power systems , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[9]  Xingshe Zhou,et al.  An Approach for Safety Analysis of Cyber-Physical System Based on Model Transformation , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[10]  Sriram Sankaran,et al.  Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[11]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.