Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Medical services
biblio
Metrics and Techniques for Early Detection in Communication Networks
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
Anomaly Detection
Communication networks
early detection
early detection anomaly technique evaluation
Information systems
Measurement
Medical services
pubcrawl
security
security level
Security Metrics
security of data
time aware metrics
time-aware metrics
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
layered-security
wearables security
Wearable Device
Ubiquitous Computing Security
security threats
security of data
security mechanisms
Scalability
Resiliency
pubcrawl
privacy
Metrics
Medical services
medical field
layered-security model
data privacy
IoT
IoMT
Internet of Things
internet of medical things
information security
Industries
Immune system
immune information security
Human Factors
Human behavior
healthcare industry
health care
Device-Connect-Manage
biblio
Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
Access Control
Australia
authentication
authorisation
constrained IoT resources
Human behavior
Identity management
Internet of Things
Medical services
mobile wearable devices
Protocols
pubcrawl
resilience
Scalability
smart sensors
biblio
A Secure Fog-Cloud Based Architecture for MIoT
Submitted by aekwall on Mon, 01/20/2020 - 10:53am
medical data
Temperature sensors
Software Architecture
security of data
security issues
secure fog-cloud based architecture
Scalability
Resiliency
pubcrawl
Monitoring
MIoT devices
MIoT architectures
MIoT
Medical services
medical Internet of Things
attribute-based encryption
medical computing
medial data
Internet of Things
healthcare services
healthcare providers
Healthcare
health care
Fog Computing and Security
Fog computing
Data Security
computer architecture
Cloud Computing
Biomedical monitoring
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
Implementation of Searchable Encryption System with Dedicated Hardware and Its Evaluation
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
database management systems
shared database
searchable encryption system
Medical services
Hardware Implementation
encrypted data
dedicated hardware
symmetric searchable encryption
public key encryption with keyword search
Big Data
personal information
searchable encryption
Artificial Intelligence
Cryptography
composability
Resiliency
pubcrawl
resilience
biblio
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Submitted by grigby1 on Mon, 08/26/2019 - 10:09am
Internet-of-Things
Trusted Computing
service cross-layered system
sensors
security of data
security assessment as a service
SAaaS
Resiliency
resilience
pubcrawl
Monitoring
Medical services
IT healthcare ecosystem
Cloud Computing
Internet of Things
Healthcare
health care
digital-personalised-trusted healthcare
cybersecurity risk
Cybersecurity
cyber threats
cyber aware environment
Cross Layer Security
computer security
composability
biblio
Secure and Lightweight Biometric-Based Remote Patient Authentication Scheme for Home Healthcare Systems
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
remote medical treatment
Metrics
Mobile handsets
mobile healthcare system communication
patient care
pubcrawl
public key cryptography
public mobile healthcare environments
Remote authentication
Medical services
resilience
Resiliency
Scalability
secure based remote patient authentication scheme
security
security of data
Servers
healthcare system
biometric
biometric encryption
biometrics (access control)
digital systems
e-Healthcare
elliptic curve encryption
Elliptic curves
health care
authentication
home computing
home healthcare system
lightweight biometric-based remote patient authentication scheme
medical computing
medical data
Medical diagnostic imaging
medical information systems
biblio
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
patient records
electronic health records
health record
Knowledge Graph (Ontology)
medical organization
medical providers
Medical services
Ontologies
Organizations
patient centric approach
patient data
Electronic Health Record (EHR)
safe cloud-based EHR management
secure access delegation
secure cloud-based EHR management
Semantic Web
service management
Human behavior
pubcrawl
collaboration
policy-based governance
Attribute Based Encryption (ABE)
Scalability
authorisation
Cryptography
encryption
Access Control
data privacy
Access Broker
Attribute Based Access Control (ABAC)
attribute based encryption
Cloud Computing
authorization delegation mechanism
authorization models
cloud based EHR systems
cloud storage
cloud-based EHRs access authority
cloud-based electronic medical records services
data access authorization
data breaches
easy cloud-based EHR management
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »