Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security system
biblio
Intrusion Detection and Security System for Blackhole Attack
Submitted by grigby1 on Mon, 06/01/2020 - 3:57pm
Blackhole attack
IDS
intrusion detection system
network simulator
pubcrawl
resilience
Resiliency
Scalability
security issues
security of data
security system
telecommunication security
Wireless Sensor Network
wireless sensor networks
biblio
Risk Management as a Strategic Management Element in the Security System
Submitted by aekwall on Mon, 02/17/2020 - 2:27pm
uncertainty
strategic security management
strategic management element
Security Risk Management
security policy formation
science
Management
dynamic security environment
security management
security system
Risk
security
Economics
risk management
Metrics
pubcrawl
Resiliency
Task Analysis
Organizations
Scalability
security of data
biblio
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
testing
Servers
security system
security risks
search engines
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Pairing Encryption
machine learning transactions
machine learning engines
attribute-based encryption
low time consumption
learning (artificial intelligence)
IoT applications
Internet of Things
internal machine learning architecture
Human behavior
Engines
Cryptography
CP-ABE
computer network security
Computational modeling
computation process
composability
biblio
An Innovative Model for the Enhancement of IoT Device Using Lightweight Cryptography
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
Lightweight algorithms
Wireless Sensorȍ Networksȍ(WSN)
telecommunication security
security system
Scalability
Safety
resource constrained devices
Resiliency
RadioȍFrequency ȍIdentification (RFID)
pubcrawl
privacy
lightweight cryptography
Lightweight Ciphers
batteries
IoT device
InternetȍofȍThings(IOT)
Internet of Things
hash algorithm
data privacy
Cryptography
cryptographic algorithms
commutation layer
Cloud Computing
Ciphers
Block Cipher
biblio
Machine Learning for Network Resiliency and Consistency
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
global overview
software defined networking
security system
security
SDN
Resiliency
resilience
pubcrawl
programmable networking
network resiliency
network resilience
network consistency
network configurations
machine learning
learning (artificial intelligence)
adaptability
flow tables
feature extraction
deep learning architectures
deep learning
data privacy
convolutional neural networks
convolutional neural nets
consistency verification system
consistency test scenario
computer architecture
artificial intelligence resiliency system
Artificial Intelligence
ARS
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
security system
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
level measurement
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
microcontrollers
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
security
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
biblio
Magnetic Signature Analysis for Smart Security System Based on TMR Magnetic Sensor Array
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
Acoustic Fingerprints
composability
Human behavior
magnetic sensors
Magnetic separation
Magnetic signature
PSD analysis
pubcrawl
Resiliency
security
security system
sensor arrays
TMR
Tunneling magnetoresistance
biblio
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
Fog computing
telecommunication security
Servers
security system
security service
security places
security
Scalability
Resiliency
pubcrawl
latency problems
latency issues
fog-computing requirements
fog servers
Fog Computing and Security
authentication
entry point
end devices
efficient mutual authentication scheme
edge resources
edge devices
edge computing
Cryptography
Cryptographic Protocols
computer architecture
cloud computing services
Cloud Computing
Authentication schemes
Authentication Protocols
biblio
An intelligent security system for autonomous cars based on infrared sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
nonsafety applications
ICMetric technology
ICmetrics
infrared detectors
infrared sensors
Integrated Circuit Metric technology
intelligent security system
Intelligent Transportation Systems
Intrusion Detection
mobile robots
Hacking
notification messages
road safety
road vehicles
self-driving vehicles
simulated vehicular ad hoc network
traffic engineering computing
unique extracted features
sensor security
security system
pubcrawl
Resiliency
Human behavior
Human Factors
feature extraction
composability
security of data
vehicular ad hoc networks
Metrics
telecommunication security
automobiles
autonomous cars
autonomous vehicle system
autonomous vehicles
awareness messages
control data authentication
external communication systems
« first
‹ previous
1
2
3
4
next ›
last »