Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Biomedical monitoring
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 11:35am
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
Augmented Reality in Human-Robot Cooperative Search
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
navigation
Three-dimensional displays
situational awareness
Scalability
robots
robot vision
Resiliency
resilience
pubcrawl
privacy
Portable computers
augmented reality
Monitoring
mobile robots
intelligent robots
human-robot interaction
human-robot cooperative search
human teammate
Human behavior
field environments
Biomedical monitoring
biblio
Privacy-Preserving and Multi-Dimensional Range Query in Two-Tiered Wireless Sensor Networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
multidimensional range query protocol
wireless sensor networks
two-tiered wireless sensor networks
Silicon
sensor electronic devices
Resiliency
resilience
query processing
pubcrawl
Protocols
probability attacks
privacy-preserving range query
PERQ
network accountability
Biomedical monitoring
Monitoring
modular arithmetic range query mechanism
Metrics
Heart rate
generalized distance-based range query mechanism
differential attacks
data privacy
data integrity
cyclic modular verification scheme
Cryptographic Protocols
composability
Collusion Attacks
biblio
Impedance phlebography based pulse sensing using inductively-coupled inkjet-printed WRAP sensor
Submitted by el_wehby on Mon, 06/04/2018 - 4:32pm
MOSFET
wireless sensor networks
wireless resistive analog passive sensors
Wireless communication
tuning capacitor
Silver
planar spiral coil
patient monitoring
patient health monitoring
Oscilloscopes
MOSFET transducer
bioelectric potentials
mobile health
ink jet printing
inductively-coupled inkjet- printed WRAP sensor
impedance phlebography based pulse sensing
Impedance
health care
frequency 13.56 MHz
body sensor networks
Biomedical monitoring
1637250
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Secure Lightweight Context-Driven Data Logging for Bodyworn Sensing Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
Scalability
medical domain
Medical services
Monitoring
privacy
pubcrawl
recording
resilience
Resiliency
Medical diagnostic imaging
secure lightweight context-driven data logging
sensor medical data storage
sensor placement
sensors
timestamping
wearable technology
wearables security
Biomedical monitoring
medical computing
Logic gates
localization
Human behavior
Forensics
Digital Forensics
data structures
data handling
data fingerprint storage
contextual information security
chronological epoch-level blocks
bodyworn sensing devices
body sensor networks
Bloom filters
blockchain
biblio
Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
resilience
WIoT environments
wearables security
Wearable IoT
wearable Internet-of-Things
Training
sensor-hijacking attacks
security of data
security
Scalability
resource-constrained wearable IoT systems
Resource constrained
Resiliency
Amulet platform
pubcrawl
privacy
Internet of Things
Human behavior
feature extraction
Electrocardiography
data-driven security solutions
Data-driven security solution
Biomedical monitoring
batteries
Base stations
« first
‹ previous
1
2
3
4
next ›
last »