Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data exchange
biblio
Wireless Sensor Networks Security: Case study
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
sensor security
wireless sensor networks security
sensor data detection
Sensor
network physical devices
live monitoring
data exchange
data
Network
power consumption
wireless
Elliptic curve cryptography
Data collection
IoT
secure communication
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
encryption
Cloud Computing
biblio
A Cyber Communication Package in the Application of Grid Tied Solar System
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
Rivest
internet
internet connected computers
latency reduction
Load modeling
Metrics
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
Human Factors
RSA algorithms
Scalability
secured socket layer
secured socket layer (SSL)
Servers
Shamir and Adleman (RSA)
Shamir and Adleman algorithms
Solar system
SSL
SSL Trust Models
Cryptography
advanced encryption standard (AES)
AES algorithm
bidirectional communication strategy
communication concept
communication methodology
communication process
communication program
Computational modeling
Computer crime
Computers
advanced encryption standard
cyber communication package
cyber network
cyber security
cyber security arrangement
data exchange
electrical data
electronic data interchange
grid connected solar system
grid tied solar system
Human behavior
biblio
Application of Deep Learning Technique for Automatic Data Exchange with Air-Gapped Systems and Its Security Concerns
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
DHT11 sensor
security
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Humidity
Human Factors
Human behavior
Air gaps
DH-HEMTs
deep learning
data exchange
Conferences
computer security
composability
Arduino board
Air-Gapped Systems
biblio
Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Internet of Things
sensors
security
Scalability
Resiliency
pubcrawl
proliferation
parallel processing
nanotechnology
miniaturization
Metrics
IoT infrastructures
IoT
Big Data
forensic evidence
Digital Forensics
Data Security
data exchange
cybercrime activities
cloud-computing
cloud-centric framework
Cloud Computing
CFIBD-IoT framework
business processes
big data security in the cloud
Big data isolation
biblio
A two-layer network Orchestrator offering trustworthy connectivity to a ROS-industrial application
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
production engineering computing
Trustworthy Systems
trustworthy network
trustworthy connectivity
Trusted Computing
to-end Ethernet flows
Three-dimensional displays
Service robots
ROS-industrial application
ROS-I
ROS
robotic operating system industrial distributed application
Robot sensing systems
Resiliency
Reliability
pubcrawl
composability
orchestrated two-layer network test-bed
Optical fiber networks
operating systems (computers)
network orchestrator
Local area networks
industrial robots
industrial robotics
fiber outage
end-to-end flow services
data transfer
data exchange
cyber physical systems
control engineering computing
computer network security
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 2:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
« first
‹ previous
1
2