Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication protocols
biblio
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
mobile ad hoc networks
vehicular networks
V2V communications
Routing protocols
Routing
Resiliency
Reliability
pubcrawl
performance evaluation
Ad Hoc Network Security
Metrics
Conferences
computer network reliability
Compositionality
communication protocols
cognitive radio ad-hoc networks
Ad hoc networks
biblio
A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
heterogeneous control systems
multiagent framework
resilience enhancement
constituent agents
cyber disturbances
cyber space
cyber vulnerabilities
distributed middleware
ensures state
networked control systems
heterogeneous networked control systems environments
minimum level
modern computing networks
multiagent middleware
networking technologies
physical disturbances
Resilient Security Architectures
communication protocols
IP networks
security
Resiliency
pubcrawl
wireless sensor networks
Protocols
multi-agent systems
resilience
computer network security
middleware
sensors
telecommunication control
heterogeneous devices
actuators
physical world
distributed control
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Light-Weighted Security Access Scheme of Broadband Power Line Communications for Multi-Source Information Collection
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
remote information collection
multisource data acquisition services
multisource information collection
power consumption
power consumption information acquisition system
Power Line Communication
Power line communications
power meters
Predictive Metrics
Protocols
pubcrawl
Multi-meter reading
resilience
Resiliency
Resistance heating
security
security access
services security isolation
smart meter-reading technologies
smart meters
terminal access
Water heating
data acquisition
Bandwidth
broadband power line communications
Business
carrier transmission on power lines
channel security isolation
communication modes
communication optimization
communication protocols
communication reliability
composability
acquisition terminals
electrical interfaces
heat meters information collection services
integrated meter service
light-weighted security access scheme
meter terminals
meter-reading service
Meters
Metrics
Microelectronics Security
biblio
Security event analysis in XBee-based wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:05pm
network nodes
XBee circuits
wireless sensor networks
wireless mesh networks
wireless mesh network
Wireless communication
telecommunication security
software/hardware assets
security of data
security event collection
security event analysis
security event
Security analysis
security
resilience
pubcrawl
Analytical models
Modeling Attacks
mobile network
microcontrollers
Metrics
Mesh networks
intruder models
data flows
data correlation
cyber-physical systems
cyber-physical security events
Crisis Management
composability
Communication system security
communication protocols
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
Using Smartphones As Continuous Receivers in a Visible Light Communication System
Submitted by grigby1 on Thu, 10/19/2017 - 10:26am
communication protocols
free-space optics
Metrics
pubcrawl
Resiliency
rolling shutter effect
Scalability
visible light communication
Visible Light Communications Security
1
2
next ›
last »