Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT security
biblio
Development of IoT Security Exercise Contents for Cyber Security Exercise System
Submitted by grigby1 on Thu, 08/12/2021 - 3:20pm
IoT security
virtual environments
Servers
security education
Resiliency
resilience
pubcrawl
Metrics
Linux
composability
IoT
Human behavior
education
CyExec
Cybersecurity
Containers
computer security
biblio
Prov-IoT: A Security-Aware IoT Provenance Model
Submitted by grigby1 on Thu, 08/12/2021 - 3:20pm
IoT security
security metadata
security
risk management
resilience
pubcrawl
provenance-based security
provenance graph
privacy
metadata
IoT-Health scenario
Provenance
IoT provenance model
Internet of Things
documentation
data propagation
Computational modeling
composability
Resiliency
Metrics
Human behavior
biblio
Enabling Security Analysis of IoT Device-to-Cloud Traffic
Submitted by grigby1 on Mon, 08/02/2021 - 2:23pm
Cloud Computing
composability
data privacy
encryption
IoT security
Logic gates
Middleboxes
middleware
policy-based governance
privacy
Protocols
Prototypes
pubcrawl
resilience
Resiliency
Transport layer encryption
biblio
Improving Cellular IoT Security with Identity Federation and Anomaly Detection
Submitted by grigby1 on Tue, 05/25/2021 - 1:20pm
Cross Layer Security
Adaptation models
Anomaly Detection
Clustering algorithms
composability
Data models
IoT security
machine learning
mobile network security
Partitioning algorithms
pubcrawl
resilience
Resiliency
security
biblio
Filter Based Scalable Blockchain for Domestic Internet of Things
Submitted by grigby1 on Wed, 05/05/2021 - 11:22am
blockchain
flow policies
Internet of Things
IoT security
pubcrawl
Scalability
Scalable blockchain
Scalable Security
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
Protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
lightweight key sharing protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security
security protocols
shared key
silicon physical unclonable function
Table lookup
I-O Systems
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
authentication
i-o systems security
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »