Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT security
file
Charge-Recycling based Computing Paradigm for Wirelessly Powered Internet-of-Things
Submitted by Emre Salman on Mon, 12/17/2018 - 12:00pm. Contributors:
Emre Salman
Milutin Stanacevic
Low power
RF power harvesting
IoT security
Session 7: LT
1646318
CPS-PI Meeting 2018
2018
Presentation
biblio
Interoperability and lightweight security for simple IoT devices
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
Ontologies
sensors
Semantics
Semantic Web
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Passive optical networks
open systems
Ontology
ontologies (artificial intelligence)
composability
nonfunctional properties
Microelectronics Security
Metrics
JSON-LD
IoT security
IoT device security properties
IoT device privacy properties
IoT device interoperability
IoT device annotate connectivity properties
IoT device
interoperability
Internet of Things
data privacy
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
New Trust Metric for the RPL Routing Protocol
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
security
resilience
Resiliency
Routing
routing nodes
Routing protocols
RPL
RPL routing protocol
Scalability
Secure Routing
reliable routing processes
Selfish nodes
telecommunication network reliability
telecommunication security
trust inference problem
Trust management
trust metric
trust objective function
Trust Routing
vital security requirement
Linear programming
BR
collaboration
composability
distributed Bellman-Ford algorithm
DODAG information object message
ERNT
extended RPL node trustworthiness
Internet of Things
IoT security
border router
lossy networks
Low power
maintenance engineering
Measurement
metric based RPL trustworthiness scheme
MRTS
new Objective Function TOF
pubcrawl
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
biblio
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)
Submitted by grigby1 on Mon, 03/05/2018 - 12:17pm
Digital Forensics
Digital Forensics Model
Human behavior
Human Factors
information forensics
Internet of Things
IoT
IoT applications
IoT Forensics
IoT security
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
A multi-factors security key generation mechanism for IoT
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
multi-factors
self-organising network
self-organising Internet of Things network
self-adjusting systems
security of data
security
Resiliency
pubcrawl
Protocols
multifactors security key generation mechanism
Multi-Level Security
Ad Hoc Network Security
Logic gates
IoT security
IoT nodes
IoT
Internet of Things
Human Factors
Human behavior
Cryptography
composability
Ad hoc networks
biblio
CommunityGuard: A Crowdsourced Home Cyber-Security System
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
composability
crowdsourced security
DDoS Attack Prevention
Human behavior
intrusion prevention
IoT security
Metrics
pubcrawl
Resiliency
SDN security
trustworthiness
biblio
Secure Data Provenance for the Internet of Things
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Networked Control Systems Security
collaboration
composability
data provenance
Human behavior
human factor
information theoretic security
IoT security
Metrics
Policy
pubcrawl
Resiliency
Scalability
theoretical cryptography
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »