Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RFID
biblio
Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN
Submitted by grigby1 on Thu, 09/16/2021 - 2:12pm
Radio frequency identification (RFID)
Voronoi cells
Two dimensional displays
traffic characterization
security
RFIDs
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Adaptation models
radio frequency identification
pubcrawl
NFC
IoT
Human behavior
Computational modeling
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module
Submitted by grigby1 on Thu, 09/16/2021 - 2:12pm
Protocols
standards
security
RFIDs
RFID
Resiliency
resilience
Radio frequency identification (RFID)
radio frequency identification
pubcrawl
ASIP
Passive RFID tags
lightweight cryptography
Human behavior
HSM
Hardware
flexibility
Cryptography
Ciphers
biblio
Research of Ubiquitous Power Internet of Things Security Authentication Method Based on CPK and RIFD
Submitted by grigby1 on Thu, 09/16/2021 - 2:11pm
CPK
Human behavior
key management
pubcrawl
radio frequency identification
Radio frequency identification (RFID)
resilience
Resiliency
RFID
RFIDs
security authentication
ubiquitous power IoT
biblio
Distributed Key Management Authentication Algorithm in Internet of Things (IOT)
Submitted by grigby1 on Thu, 09/16/2021 - 2:11pm
radio frequency identification
Servers
security
RFIDs
RFID tags
RFID
Resiliency
resilience
Radio frequency identification (RFID)
authentication
pubcrawl
Protocols
IoT
Internet of Things
Human behavior
distributed algorithm
authentication algorithm
biblio
Research on RFID Technology Security
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
Radio frequency identification (RFID)
security
RFIDs
RFID Vulnerability analysis
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Access Control
radio frequency identification
Radio frequency
pubcrawl
Mifare card
Human behavior
encryption
Databases
authentication
biblio
Security Monitoring System Using Magnetically-Activated RFID Tags
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
radio frequency identification
Switches
sensors
security monitoring
RFIDs
RFID
Resiliency
resilience
reed switch
Radio frequency identification (RFID)
Antenna measurements
pubcrawl
proximity sensor
Passive RFID tags
Monitoring
magnetic sensors
IoT
Human behavior
Entry detection
antennas
biblio
Implementation of Two Factor Authentication based on RFID and Face Recognition using LBP Algorithm on Access Control System
Submitted by grigby1 on Thu, 07/08/2021 - 3:38pm
Access Control
authentication
face recognition
Histograms
Human behavior
Human Factors
LBP
photo attack
process control
Prototypes
pubcrawl
radiofrequency identification
RFID
security
spoofing detection
two factor authentication
biblio
Enhance Safety and Security System for Children in School Campus by using Wearable Sensors
Submitted by grigby1 on Thu, 05/20/2021 - 12:13pm
privacy
Bluetooth
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
RFID
Child Safety
School Campus
Wearable sensors
wearables security
biblio
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
Intellectual Property Protection
three-dimensional printing
supply chains
supply chain management
spatially distributed
software area
safety-critical products
RFID
printing industry
licensing models
License Management
digital media
additive manufacturing
3D print supply chain
ip protection
copyright
risk management
Labeling
Three-dimensional displays
Plagiarism
Metrics
Law
composability
production engineering computing
Biological system modeling
blockchain technology
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »