Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart objects
biblio
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
context-aware approach
trustworthiness inference framework
trust generation
trust elements
sociological principles
social networking
recommendation trust
psychological principles
kernel-based nonlinear multivariate grey prediction model
kernel-based nonlinear multivariate grey prediction
internal similarity trust
human behaviors
fuzzy logic method
familiarity trust
external similarity trust
context-aware trustworthiness inference framework
Internet of Things
Social Internet of Things
grey systems
psychology
Trust management
Predictive models
trustworthiness
Fuzzy logic
smart objects
direct trust
Reliability
social networking (online)
composability
pubcrawl
Trusted Computing
Protocols
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
forum
Call for Papers: Elsevier Computer Networks, Special Issue on 5G-Enabled Internet of Things, Applications and Services
Submitted by willirn1 on Fri, 06/28/2019 - 2:54pm
Call for Papers
Special Issue on 5G-Enabled Internet of Things, Applications and Services
Elsevier Computer Networks
Calls for Papers
Architectures
Modeling
Foundations
security
privacy
design
Architectures
smart objects
5G
Internet of Things (IoT)
behavior modeling
Announcement
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
Security and privacy for IoT and fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 3:47pm
heterogeneous ecosystem
Trust management
smart objects
security challenges
Scalability
risk-based trust management model
Resiliency
pubcrawl
Protocols
privacy issues
privacy
IoT
Internet of Things
human privacy
authentication
fog computing paradigm
Fog Computing and Security
Fog computing
edge computing
distributed processing
Data Security
data privacy
computing clouds
computer network security
Computational modeling
Cloud Computing
cameras etc
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
Internet of Things
trusted host
symmetric cryptography
smart objects
resource-constrained node
Protocols
protocol
performance evaluation
Peer-to-peer computing
authentication
Face
delegated authenticated authorization
Cryptographic Protocols
cross-domain setting
constrained environments
client authentication
authorization
biblio
Proposal of a secure, deployable and transparent middleware for Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
Internet of Things
Zigbee
Transparent Middleware
TLS
smart objects
security of data
security architecture
security
secure middleware
protection measures
OAuth
middleware
IoT transparent middleware
AES
electronic data interchange
deployable middleware
data privacy
data integrity
data exchange service privacy
data exchange service integrity
data exchange service confidentiality
data exchange service authenticity
computer architecture
authorization
authentication