Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT networks
biblio
Neighborhood Component Analysis and Artificial Neural Network for DDoS Attack Detection over IoT Networks
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
Metrics
Technological innovation
security
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
Pandemics
Neighborhood Component Analysis
artificial neural network
Memory management
IoT networks
denial-of-service attack
DDoS
cyber physical systems
collaboration
backpropagation neural network
Artificial Neural Networks
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
noninvasive architecture independent machine learning attack
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
authentic PUFs
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
machine learning
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
Cryptography
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
biblio
A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Privacy.
Trusted Computing
trust model
trust computation
trust
telecommunication security
similarity model
similarity
sensors
security
Resiliency
resilience
Reliability
Recommendations
pubcrawl
Cloud Computing
mitigate badmouthing attacks
Metrics
malicious object
IoT security
IoT networks
IoT
Internet of Things
Human Factors
Human behavior
Data models
Computational modeling
composability
Collusion Attacks
biblio
A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Metrics
DDoS attack detection
resource IoT devices
machine learning based detection
machine learning (ML)
distributed denial of service attacks
Distributed Denial of Service (DDoS) attack
denial of service (dos)
comprehensive detection method
common malicious attacks
IoT networks
DDoS Defense
Object recognition
machine learning
Computer crime
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Support vector machines
performance evaluation
Internet of Things (IoT)
Internet of Things
computer network security
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Middleware Based Node Authentication Framework for IoT Networks
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
node authentication framework
wireless sensor networks
security of data
security mechanism
security
Resiliency
resilience
pubcrawl
policy-based governance
authentication
Network
middleware security
middleware
IoT networks
Internet of Things
internet
Conferences
composability
1
2
3
next ›
last »