Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security risk
biblio
Research on the Characteristics and Security Risks of the Internet of Vehicles Data
Submitted by aekwall on Fri, 01/13/2023 - 2:52pm
Organizations
Human Factors
data privacy
pubcrawl
Scalability
Metrics
Resiliency
Industries
Data Security
Cyberspace
data science
Standards organizations
security policies
Internet of Vehicle
security risk
biblio
How to Improve Risk Management in IT Frameworks
Submitted by grigby1 on Fri, 11/18/2022 - 1:06pm
Decision Making
Security Risk Management
ITIL
IT management
IT control framework
COBIT
security risk
risk assessment
Buildings
project management
Business
risk management
information technology
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
biblio
Penetration Testing in IoT Network
Submitted by grigby1 on Thu, 08/12/2021 - 3:21pm
Penetration Testing
tools
testing
Software
security risk
security
Resiliency
resilience
pubcrawl
composability
Metrics
Measurement
IoT security
IoT
Internet of Things
Human behavior
cyber security attack
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 2:58pm
Human behavior
transaction addresses
transaction address
security risk
security of data
Scalability
pubcrawl
pattern classification
network representation learning
learning (artificial intelligence)
imbalanced multi-classification
illegal transactions
addresses identification algorithms
feature extraction
fault tolerance
drugs
Decision trees
de-anonymity approach
Data mining
cryptocurrencies
bitcoin security
bitcoin
annotated data
biblio
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
genetic algorithm
security scalability
security risk
security of data
Security Metrics
Scalability
risk management
resource provisioning
quantitative security risk evaluation approach
pubcrawl
InterCloud
Artificial Bee Colony
evolutionary computation
customers security requirements
Compositionality
cloud service providers
cloud security risk-aware resource provisioning scheme
cloud data centers
cloud computing technology
cloud computing infrastructure
cloud computing environment
Cloud Computing
1
2
next ›
last »