Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bluetooth
biblio
Bluetooth for decoy systems: A practical study
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
Monitoring
Wireless communication
telecommunication security
Servers
security
Resiliency
resilience
Raspberry Pi
pubcrawl
performance evaluation
bluetooth security
low energy bluetooth
human factor
Human behavior
decoy system
Conferences
composability
Arduino boards
Bluetooth
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
Smart bluetooth low energy security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
smart phones
PSoC 4 BLE
pubcrawl
resilience
Resiliency
security
sensors
Servomotors
smart Bluetooth low energy security system
physical lock
smartphone
surveillance system
system-on-chip
Web page
Web site
wireless connection
wireless technologies
BLE (Bluetooth Low Energy)
low energy consumption security system
IoT (Internet of Things)
image transmission
human factor
Human behavior
energy security
energy consumption
Conferences
composability
Cameras
building management systems
bluetooth security
Bluetooth
BLE technology
biometric
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
privacy
wireless LAN
Web servers
wearables security
wearables
wearable computers
smart phones
security
secure Internet communication
secure communication protocols
Scalability
Resiliency
resilience
pubcrawl
Protocols
available wearable computing devices
network measurements
Internet servers
internet
Human behavior
energy consumption
direct secure communication
direct Internet connection
direct Internet communication
direct communication
Cryptography
computer network security
Ciphers
Bluetooth
biblio
Security Analysis of Bluetooth Low Energy Based Smart Wristbands
Submitted by grigby1 on Mon, 04/02/2018 - 12:54pm
replay attacks
wearables security
Wearable devices
wearable computers
Trade agreements
tools
smart wristbands
smart wristband
smart watch
security of data
security
Scalability
Resiliency
resilience
Android software application
pubcrawl
privacy
mobile computing
man-in-the-middle attacks
Human behavior
Heart rate
Denial of Service attacks
brute-force attacks
bluetooth low energy
Bluetooth
Biomedical monitoring
batteries
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
Exploitation of Dual Channel Transmissions to Increase Security and Reliability in Classic Bluetooth Piconets
Submitted by grigby1 on Tue, 09/19/2017 - 12:25pm
Bluetooth
Cognitive Radio Security
dual channel transmissions
encryption diversity
frequency hopping
Metrics
pubcrawl
Reliability
Resiliency
Scalability
security
Time Frequency Analysis
biblio
Impact of the Physical Web and BLE Beacons
Submitted by grigby1 on Wed, 05/17/2017 - 1:51pm
eddystone
Scalability
Resiliency
pubcrawl
physical web
Metrics
ibeacon.
Human behavior
eddystone-url
beacons
cybersecurity education
Cybersecurity
computer security
composability
collaboration
bluetooth security
Bluetooth
BLE
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »