Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart homes
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 2:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
pubcrawl
telecommunication security
standards
Smart homes
Smart Home
Servers
security-based solutions
security smart homes
security of data
security approach
security
Resiliency
resilience
Remote Patterns
authentication
privacy
policy-based governance
MidSecThings
middleware security
middleware
IoT middleware
IoT devices
IoT
Internet of Things
home automation
distributed security mechanisms
data privacy
composability
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
medical computing
security architecture analysis framework
security analysis approach
safety and security
safety analysis framework
IoT architectures
health care sensors
architecture analyses
Network Security Architecture
medical devices
medical data
Safety
health care
Smart homes
Analytical models
pubcrawl
Resiliency
computer architecture
security
Internet of Things
Medical services
security of data
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »