Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power demand
biblio
Design and Development of a Smart Surveillance System for Security of an Institution
Submitted by grigby1 on Tue, 05/10/2022 - 3:31pm
pubcrawl
video surveillance
surveillance
smart surveillance
security breaches
security
Safety
Resiliency
resilience
efficiency
Power demand
Metrics
machine learning algorithms
machine learning
Internet of Things (IoT)
Human behavior
fire detection
face recognition
biblio
Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus Algorithm
Submitted by aekwall on Tue, 03/01/2022 - 4:32pm
Power demand
Transaction Finality
The Internet of Thing (IoT)
Secure Consensus Mechanism
Resiliency
pubcrawl
Protocols
Proof of Authority PoA
Power measurement
blockchain
Organizations
network accountability
Metrics
data analysis
cyber security
Consensus algorithm
composability
biblio
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
IoT
Scalability
rop attacks
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
Resiliency
resilience
pubcrawl
Power demand
Information Reuse
Incremental Code Update
Human Factors
Generators
encryption
Computer crime
composability
codes
authentication
security
biblio
Identifying Metrics for an IoT Performance Estimation Framework
Submitted by aekwall on Mon, 01/31/2022 - 4:32pm
Hardware
Computational modeling
performance evaluation
estimation
pubcrawl
Scalability
Resiliency
Power demand
Memory management
embedded computing
work factor metrics
biblio
Self-sovereign Identity Management in Wireless Ad Hoc Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 4:14pm
Mesh networks
wireless mesh networks
Wireless communication
Systems architecture
software reliability
Software
Self-sovereign Identity Management (SSI)
Prototypes
Power demand
Metrics
Scalability
MANET
lora
Internet of Things (IoT)
composability
Identity management
pubcrawl
Human behavior
Resiliency
biblio
A Secure Employee Health Management System Using Werable Technology
Submitted by grigby1 on Mon, 01/31/2022 - 3:47pm
Transportation
block chain technology
wearables security
wearable computers
Temperature distribution
Temperature measurement
Power demand
Internet of Things
Temperature sensors
privacy
Data Security
Sensor
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Organizations
biblio
Elliptic Curve Parameters Optimization for Lightweight Cryptography in Mobile-Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:18pm
Ad Hoc Network Security
Ad hoc networks
Compositionality
delays
elliptic curve
Elliptic curve cryptography
lightweight cryptography
Memory management
Metrics
Mobile Ad-Hoc Networks (MANETs)
Power demand
pubcrawl
Resiliency
Routing
Routing protocols
biblio
On the Impact of Side Information on Smart Meter Privacy-Preserving Methods
Submitted by grigby1 on Tue, 11/30/2021 - 2:33pm
privacy
Training
Smart Grids
smart grid consumer privacy
Scalability
Resiliency
resilience
Random variables
pubcrawl
collaboration
Power demand
Policy-Governed Secure Collaboration
optimization
Metrics
Human behavior
data privacy
composability
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »