Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security goals
biblio
Security Issues and Challenges in RFID, Wireless Sensor Network and Optical Communication Networks and Solutions
Submitted by grigby1 on Mon, 11/08/2021 - 12:32pm
radiofrequency identification
attacks
Communication networks
composability
Human behavior
Metrics
network security
optical network
Production
Protocols
pubcrawl
WSN
Reliability
resilience
Resiliency
RFID security
security
security and privacy
security goals
sensor networks
sensor security
wireless sensor networks
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
security goals
power engineering computing
power system security
privacy
pubcrawl
RAMI 4.0
Reference Model of I Information Assurance and Security
risk analysis
RMIAS
Scalability
Metrics
security of data
security-by-design
Smart Grid evolution
smart grid security
Smart Grids
smart power grids
sophisticated engineering practices
standards
surplus energy
distributed energy resources
Resiliency
adequate security countermeasures
architecture
architecture-based approach
computer architecture
computer security
control infrastructure
critical infrastructure
critical infrastructures
Resilient Security Architectures
distributed power generation
distributed system
distribution system operators
Energy Distribution Grids
Enterprise Architecture
Europe
grid gatekeepers
methodology
biblio
Addressing Security Challenges in Industrial Augmented Reality Systems
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
privacy
wireless networking
Streaming media
Smart industry
security risks
security of data
security goals
security challenges
security assets
security
Scalability
Resiliency
resilience
pubcrawl
productive applications
augmented reality
Pipelines
Mobile handsets
Industry 4.0 augmented reality
Industry 4.0
Industries
industrial augmented reality systems
industrial AR applications
human-machine communication
Human behavior
edge computing
distributed computing
contemporary AR applications
Cameras
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability