Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things (IoT)
biblio
Authentication Schemes and Security Issues in Internet Of Everything (IOE) Systems
Submitted by aekwall on Tue, 06/01/2021 - 12:23pm
Internet of Things (IoT)
wireless sensor networks
wireless sensor network (WSN)
Smart Grids
Servers
Sensor Systems
security
pubcrawl
Protocols
people to people (P2P)
people to machine (P2M)
machine-to-machine (M2M)
Smart Grid Sensors
Internet of Things
Internet of Everything (IoE)
Intelligent sensors
Device to Device
Cryptography
computational intelligence
Compositionality
composability
cloud
authentication
actuators
biblio
Sequence Obfuscation to Thwart Pattern Matching Attacks
Submitted by grigby1 on Thu, 05/13/2021 - 11:10am
anonymization
anonymous messaging
information-theoretic privacy
Internet of Things (IoT)
obfuscation
Privacy Preserving Mechanism (PPM)
pubcrawl
resilience
Resiliency
statistical matching
superstring
biblio
BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things
Submitted by grigby1 on Tue, 04/27/2021 - 1:21pm
authentication
blockchain
DTLS
Internet of Things
Internet of Things (IoT)
pubcrawl
Public key
Random access memory
resilience
Resiliency
Scalability
security
Servers
TLS
Transport Layer Security
biblio
BSS: Blockchain Enabled Security System for Internet of Things Applications
Submitted by grigby1 on Tue, 04/27/2021 - 1:20pm
authentication
blockchain
Computer crime
energy consumption
Internet of Things
Internet of Things (IoT)
pubcrawl
resilience
Resiliency
Scalability
security
smart contracts
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 11:56am
home computing
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
Safety
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
security system
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
Internet of Things
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Modified Grey Wolf Optimization(GWO) based Accident Deterrence in Internet of Things (IoT) enabled Mining Industry
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
patient monitoring
occupational safety
occupational health
mining industry
mine workers
Introduction
industrial accidents
Heart rate
health conditions
accident deterrence
Accident
grey wolf optimization
grey systems
IoT
Deterrence
Personnel
computerised monitoring
optimisation
production engineering computing
pubcrawl
Human behavior
Resiliency
Internet of Things (IoT)
Internet of Things
Scalability
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »