Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bluetooth
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
object behaviour
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
data collection capabilities
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
Bluetooth
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
IoT
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
biblio
Password Guessing Using Machine Learning on Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
pubcrawl
wearables security
wearables
Wearable Device
wearable computers
ubiquitous items
sensitive data
security purposes
security of data
security
Scalability
Resiliency
raw data
accelerometer
privacy
password guessing
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT
Human behavior
health context
GPS
Bluetooth
Accelerometers
biblio
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
random number
wearables security
WristUnlock
WristRaise mode
wrist wearable
wearable computers
usable smartphone
usability features
touch-based physical channel
touch sensitive screens
Smartphone Authentication
secure smartphone
security
Bluetooth connection
Bluetooth
usability
smart phones
privacy
pubcrawl
Human behavior
Resiliency
Scalability
security of data
biblio
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Metrics
vehicle sensors
tracing system
threats
telecommunication channels
Start System
security
Scalability
Resiliency
pubcrawl
PKES system
PKES Forcefield movement-tracing
pattern locks
passive keyless entry and start system
multifactor authentication
amplified relay attack
keys (locking)
Key Bearing algorithm
Human Factors
Human behavior
entry access system
coordinate tracing
CAR security
Bluetooth communication channel
Bluetooth
automotive electronics
automobile security
authentication
attacks
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
energy efficient tree algorithm
ultralow energy consumption
tree network
telecommunication power management
telecommunication network reliability
resource-constrained devices
Resiliency
pubcrawl
Protocols
network lifetime
multihop routing
multihop BLE networks
IoT
fast growing protocol
expandability
BLE
Energy Efficiency
energy dissipation
energy consumption profile
energy conservation
constrained-resource nodes
composability
complex systems
Bluetooth low energy networks
bluetooth low energy
Bluetooth
BLE static constrained-resources networks
BLE mesh
BLE expandability problem
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Logic gates
Web browser
smart lock
smart devices
Servers
Security by Default
Scalability
Resiliency
resilience
pubcrawl
policy language
network security
minimal access permissions
Access Control
IoT networks
IoT device communications
IoT application protocols
Internet of Things
internet
default-off networking
Computer crime
Cloud Computing
bluetooth low energy
Bluetooth
Bark phrases access control policies
authorisation
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 10:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 3:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Data mining
bluetooth security
Frontline BPA Low Energy Analyzer
Bluetooth special interest group
Bluetooth Smart
bluetooth low energy
Bluetooth LE security
Bluetooth LE devices
Bluetooth LE connection
Bluetooth devices
Bluetooth
computer network security
smart phones
composability
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
Protocols
encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »