Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart homes
biblio
Securing Remote Access Networks Using Malware Detection Tools for Industrial Control Systems
Submitted by aekwall on Thu, 06/09/2022 - 10:39am
industrial control
scalable systems
remote access trojans
Rats
Purdue control hierarchy
operational technology
hash calculation
Availability
integrity
Object recognition
integrated circuits
malware detection
telecommunication traffic
Smart homes
Industrial Control Systems
confidentiality
Resiliency
Scalability
pubcrawl
tools
biblio
DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks
Submitted by grigby1 on Wed, 06/08/2022 - 9:19am
intellectual property security
Transportation
Training
Smart homes
Resiliency
resilience
pubcrawl
policy-based governance
Neural networks
ip protection
Intellectual Property Protection
intellectual property
digital fingerprinting
deep neural networks
deep learning
Computational modeling
composability
biblio
Person Detection with Deep Learning and IoT for Smart Home Security on Amazon Cloud
Submitted by grigby1 on Thu, 05/05/2022 - 3:32pm
composability
infrared sensors
False Positive
embedded programming
communications protocol
edge detection
Motion detection
Smart homes
Image edge detection
edge computing
Metrics
deep learning
remote monitoring
web services
Scalability
Resiliency
resilience
pubcrawl
Artificial Intelligence
security
Cloud Computing
biblio
Introducing Mobility Metrics in Trust-based Security of Routing Protocol for Internet of Things
Submitted by grigby1 on Fri, 04/01/2022 - 1:47pm
Security by Default
Internet of Things
Linear programming
Measurement
Metrics
mobile nodes
Mobility
pubcrawl
Routing
Routing protocols
RPL
security
Security Metrics
smart cities
Smart homes
trust
biblio
IoTBox: Sandbox Mining to Prevent Interaction Threats in IoT Systems
Submitted by grigby1 on Mon, 03/14/2022 - 11:15am
pubcrawl
collaboration
Conferences
Safety
Prototypes
composability
malware
Internet of Things
sandboxing
Policy Based Governance
Software systems
Smart homes
Software Testing
interaction threats
mining sandboxes
biblio
Domain-Agnostic Context-Aware Framework for Natural Language Interface in a Task-Based Environment
Submitted by grigby1 on Thu, 03/10/2022 - 11:34am
machine learning
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
Computational modeling
Ontologies
Natural languages
Smart homes
OWL
Domain-agnostic interface
Grounding
natural language interface
Robot instructions
biblio
An Efficient SDN Architecture for Smart Home Security Accelerated by FPGA
Submitted by grigby1 on Tue, 03/01/2022 - 3:35pm
Network Security Architecture
Smart homes
Smart Home
security
Resiliency
resilience
pubcrawl
performance evaluation
parallel processing
Classification algorithms
machine learning algorithms
Logic gates
KNN
IoT
HLS
FPGA
computer architecture
biblio
Residential Sector Demand Side Management: A Review
Submitted by grigby1 on Thu, 02/24/2022 - 11:24am
Smart homes
Schedules
Scalability
pubcrawl
Prosumers
Privacy Policies
privacy
Metrics
Measurement
Human behavior
energy measurement
Energy Efficiency
energy consumption
demand side management
demand response
biblio
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security
Submitted by grigby1 on Thu, 02/24/2022 - 11:21am
telecommunication traffic
Smart homes
Smart Home
Scalability
pubcrawl
Privacy Policies
Organizations
NLP
NIST
network security
natural language processing
Metals
IoT
Human behavior
Device Functionality
biblio
Security Analysis of Smart Home Systems Applying Attack Graph
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
pubcrawl
visualization
tools
Software
Smart homes
smart Home Systems
security scalability
security
Resiliency
security weaknesses
privacy
Predictive Metrics
Market research
Layout
composability
building management system
Building automation system
attack graphs
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »