Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT ...
In this paper, a novel anti-jamming mechanism is proposed to analyze and enhance the security of adversarial Internet of Battlefield Things (IoBT) systems. In ...
Nov 1, 2019 · The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust ...
A collection of prior-developed cybersecurity techniques is reviewed for applicability to conditions presented by IoBT operational environments (e.g., ...
Application of Trust Assessment Techniques to. IoBT Systems. Ioannis Agadakos. SRI International. New York, NY USA ioannis.agadakos@sri.com. Michael Emmi. SRI ...
Application of trust assessment techniques to iobt systems. I Agadakos, GF Ciocarlie, B Copos, M Emmi, J George, N Leslie, ... MILCOM 2019-2019 IEEE Military ...
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT ... Application of Trust Assessment Techniques to IoBT Systems · Author ...
The research techniques covered focus on two themes: (1) Supporting trust assessment for known/unknown IoT assets; (2) ensuring continued trust of known IoT ...
Application of Trust Assessment Techniques to IoBT Systems. In Proc. MILCOM 2019, November 2019. Ioannis Agadakos, Gabriela Ciocarlie, Bogdan Copos, Michael ...