Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bluetooth
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
radio frequency output power
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
custom low-frequency integrated circuit
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
cyber physical systems
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
security
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
blueborne Attack defending
bluetooth security
Cyber Physical System
working methods
working mechanism
peer-reviewed researches
data switching
Bluetooth Security Framework
Bluetooth protocols
Bluetooth application-layer packet-filtering
Protocols
BlueBorne Attack
Bluetooth
cyber physical systems
Human behavior
resilience
Resiliency
composability
pubcrawl
telecommunication security
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
low power consumption
WMN
wireless mesh networks
Wireless Mesh Network Security
wireless
telecommunication security
security
Resiliency
resilience
pubcrawl
Protocols
mesh support capability
MESH network
ad-hoc networking technologies
Human behavior
cyber physical systems
Cyber Physical System
composability
Communication networks
bluetooth security
Bluetooth low energy mesh network technology
bluetooth low energy
Bluetooth
BLE security protocols
BLE mesh network security mechanisms
BLE
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT
bluetooth security
Cyber Physical System
Ubertooth
malicious actors
bluetooth low energy
BLE devices
Bluetooth
Internet of Things devices
security standards
cyber physical systems
Software
sensitive information
encryption
Human behavior
resilience
Resiliency
composability
pubcrawl
standards
Hardware
Protocols
security of data
security
Internet of Things
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
Covert Data Exfiltration Using Light and Power Channels
Submitted by grigby1 on Thu, 07/16/2020 - 11:17am
Internet of Things
standard off-the-shelf smart bulbs
Scalability
RGB LED
Resiliency
resilience
pubcrawl
Power covert channels
power channels
Optical covert channels
myriad security risks
light emitting diodes
IoT
Air gapped networks
free-space optical communication
exfiltration attacks
embedded security
Data Exfiltration
covert data exfiltration
covert channels
covert channel communications
computer network security
Compositionality
composability
Bluetooth controlled light bulb
Bluetooth
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »