Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
home automation
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by grigby1 on Thu, 12/17/2020 - 2:02pm
resilience
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
mobile computing
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
Firebase realtime database
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Adafruit IO
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Mobile Apps
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Android devices
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
cyber physical systems
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
Internet of Things
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
biblio
A multi-modelling based approach to assessing the security of smart buildings
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
methodology
ubiquitous computing
system components
smart buildings
simulations
security of data
Resiliency
resilience
pubcrawl
physical attacks
multimodelling based approach
multimodel methodology
Metrics
Access Control
man-in-the-middle attacks
INTO-CPS tool chain
home automation
Fans
fan coil unit
cyber-physical systems
critical services
CPS modeling
composability
co-simulation
building management systems
adversary model
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
pubcrawl
telecommunication security
standards
Smart homes
Smart Home
Servers
security-based solutions
security smart homes
security of data
security approach
security
Resiliency
resilience
Remote Patterns
authentication
privacy
policy-based governance
MidSecThings
middleware security
middleware
IoT middleware
IoT devices
IoT
Internet of Things
home automation
distributed security mechanisms
data privacy
composability
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
A Security-Enhanced Interoperability Middleware for the Internet of Things
Submitted by aekwall on Mon, 03/16/2020 - 10:35am
GHOST
Scalable Security
vendor
security-enhanced interoperability middleware
scalable solution
Safe-Guarding Home IoT Environments
Personalised Real-time Risk Control project
operational requirements
main features
IoT object abstraction layer
Internet of Things middleware
highly resilient solution
hardware platforms
security
generic object model
effective IoT platform
confidentiality
open systems
authorization
home automation
middleware
authentication
pubcrawl
Internet of Things
Scalability
security of data
biblio
Use of Machine Learning in Detecting Network Security of Edge Computing System
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
Training
Support vector machines
support vector machine
Smart homes
smart home system
Resiliency
resilience
RBF-function SVM method
radial basis function networks
pubcrawl
privacy
network security detection
mutation code detection
Alibaba ECS
learning (artificial intelligence)
IoT systems
Internet of Things
home automation
Hardware
feature extraction
edge computing system
edge computing
computer network security
composability
code mutation
Cloud Computing
biblio
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT
SxC framework
Software
Smart homes
Smart Home
security-by-contract
security
Scalability
Resiliency
pubcrawl
IoT systems
IoT devices
IoT device contract
Cloud Computing
Internet of Things
human beings lives
home automation
fog computing distributed paradigm
Fog Computing and Security
Fog computing
edge computing
contracts
contract-policy matching
consolidated reality
computer network security
« first
‹ previous
1
2
3
4
next ›
last »