Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things (IoT)
biblio
Design of an Authorized Digital Signature Scheme for Sensor Network Communication in Secure Internet of Things
Submitted by grigby1 on Tue, 04/26/2022 - 2:51pm
authorization
Authorized Digital Signature
Data Security
data transfer
digital signatures
Internet of Things (IoT)
manufacturing
process control
pubcrawl
resilience
Resiliency
Scalability
Sensor Network Communication
standardization
wireless sensor networks
biblio
A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 11:30am
Anomaly Detection
CPS resilience
cps resiliency
cyber-physical systems
Cyber-Physical Systems (CPS)
Internet of Things
Internet of Things (IoT)
long-term dependability and security
Monitoring
pubcrawl
resilience
Robustness
Safety
security
Self-Adaptation
self-healing
biblio
Security Considerations in the Internet of Things Protocol Stack
Submitted by aekwall on Fri, 04/01/2022 - 2:06pm
security
Software
Internet of Things
Internet of Things (IoT)
Protocols
real-time systems
Wireless communication
pubcrawl
Resiliency
Compositionality
Transportation
Predictive Metrics
IoT Protocol Stack
Vulnerability
wireless
Scientific Computing Security
biblio
Internet of Things (IoT) Based Door Lock Security System
Submitted by aekwall on Fri, 04/01/2022 - 2:05pm
Predictive Metrics
Scientific Computing Security
security system
mobile
Internet of Things (IoT)
scientific computing
Arduino
information management
android
privacy
Mobile Applications
wireless networks
Prototypes
Compositionality
Resiliency
pubcrawl
Pins
biblio
A survey on Deep Learning based Intrusion Detection Systems on Internet of Things
Submitted by aekwall on Wed, 03/23/2022 - 9:35am
Intrusion Detection
deep learning
Training
Cloud Computing
Internet of Things
Internet of Things (IoT)
Scalability
Human behavior
Safety
CNN
intrusion detection system
pubcrawl
System performance
NSL-KDD
Social Agents
biblio
Scalable Wi-Fi Intrusion Detection for IoT Systems
Submitted by grigby1 on Tue, 03/15/2022 - 2:17pm
Internet of Things
machine learning
Anomaly Detection
Intrusion Detection
pubcrawl
Scalability
Data models
Protocols
Wireless communication
Internet of Things (IoT)
Zigbee
Scalable Security
attack classification
Wi-Fi Security
Wireless Network Security
biblio
A Network Intrusion Detection Approach at the Edge of Fog
Submitted by grigby1 on Tue, 03/01/2022 - 4:15pm
network architecture
Resiliency
resilience
pubcrawl
Production
Neural networks
neural network
network security
network intrusion detection
composability
Metrics
Intrusion Detection
Internet of Things (IoT)
Image edge detection
Fog computing
Computer hacking
computer architecture
biblio
Self-sovereign Identity Management in Wireless Ad Hoc Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 4:14pm
Mesh networks
wireless mesh networks
Wireless communication
Systems architecture
software reliability
Software
Self-sovereign Identity Management (SSI)
Prototypes
Power demand
Metrics
Scalability
MANET
lora
Internet of Things (IoT)
composability
Identity management
pubcrawl
Human behavior
Resiliency
biblio
Remote Attestation as a Service for Edge-Enabled IoT
Submitted by aekwall on Tue, 01/25/2022 - 3:49pm
Prototypes
Trusted Platform Module (TPM)
Smart healthcare
Remote Attestation
edge devices
data centers
Constrained Devices
attestation
Costs
Image edge detection
composability
Human behavior
Resiliency
pubcrawl
edge computing
Internet of Things (IoT)
performance evaluation
Cloud Computing
biblio
Deep Reinforcement Learning Based Node Pairing Scheme in Edge-Chain for IoT Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Mobile Edge Computing (MEC)
Task Analysis
Tamper resistance
Servers
Scalability
resource management
pubcrawl
Policy Gradient (PG) method
optimization
blockchain
Metrics
Internet of Things (IoT)
Internet of Things
Human Factors
Human behavior
edge computing
Deep Reinforcement Learning (DRL)
blockchain technology
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »