Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
heterogeneous devices
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
heterogeneous control systems
multiagent framework
resilience enhancement
constituent agents
cyber disturbances
cyber space
cyber vulnerabilities
distributed middleware
ensures state
networked control systems
heterogeneous networked control systems environments
minimum level
modern computing networks
multiagent middleware
networking technologies
physical disturbances
Resilient Security Architectures
communication protocols
IP networks
security
Resiliency
pubcrawl
wireless sensor networks
Protocols
multi-agent systems
resilience
computer network security
middleware
sensors
telecommunication control
heterogeneous devices
actuators
physical world
distributed control
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
SCPN-Based Game Model for Security Situational Awareness in the Intenet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
security situational awareness
typical attack scenarios
stochastic colored Petri net
Smart homes
smart home environment
security situational awareness model
SCPN-based game model
SCPN
potential attack paths
IoT-based smart environment
IoT-based SCPN
heterogeneous devices
GT
complex smart environment
situational awareness
IoT
Petri nets
computer network security
Androids
game theory
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
Games
security
Internet of Things
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 1:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature