Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things (IoT)
biblio
Multi-Domain Effects and the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
MDO effect loop decision process
Weapons
Task Analysis
sensors
Scalability
Radar
pubcrawl
multidomain operating environment
multidomain effects
Multi-Domain Operations (MDO)
military effects
military computing
Artificial Intelligence
IoBT effects
iobt
Internet of Things (IoT)
Internet of Things
Internet of battlefield things
Human Factors
effects
decision-making
Decision Making
decision frameworks
contemporary military decision-processes
biblio
Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems
Submitted by grigby1 on Tue, 11/17/2020 - 1:48pm
Jamming
time-critical mission
soldier IoBT transmission link
soldier
security
secure Internet of Battlefield Things systems
Scalability
pubcrawl
psychology
psychological self-confirming equilibrium
psychological game
learning (artificial intelligence)
antijamming mechanism
IoBT network
iobt
Internet of Things (IoT)
Internet of Things
Human Factors
Games
game theory
dynamic psychological game theory
delays
Bayes methods
attacker psychological behavior
biblio
Challenges of IoT Based Smart-Government Development
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
IoT based smart-government development
user study
Smart Government
smart cities
security of data
security
Resiliency
resilience
pubcrawl
privacy
policy-based governance
new generation smart government
collaboration
Investment
Internet of Things (IoT)
Internet of Things
Internet of Everything (IoE)
government data processing
Government 2.0
extended smart-government
Electronic government
e-governments
E-Government
Cybersecurity
biblio
Realizing Dynamic Network Slice Resource Management based on SDN networks
Submitted by aekwall on Mon, 10/05/2020 - 11:00am
network service features
control plane
SDN technology
control layer
customized services
dynamic network slice resource management
dynamic network slice resource scheduling
end-to-end network
multiple virtual networks
network management authority
telecommunication scheduling
network slicing framework
SDN monitoring
SDN networks
service quality
software defined networking (SDN)
streaming services
virtual network
Dynamic Networks and Security
Metrics
Internet of Things
Internet of Things (IoT)
computer architecture
computer network management
network layer
software defined networking
Resiliency
pubcrawl
composability
Cloud Computing
5G mobile communication
network slicing
Switches
Software Defined Network
5G
communication technology
Dynamic scheduling
data plane
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 10:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
Metrics
DDoS attack detection
resource IoT devices
machine learning based detection
machine learning (ML)
distributed denial of service attacks
Distributed Denial of Service (DDoS) attack
denial of service (dos)
comprehensive detection method
common malicious attacks
IoT networks
DDoS Defense
Object recognition
machine learning
Computer crime
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Support vector machines
performance evaluation
Internet of Things (IoT)
Internet of Things
computer network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »