Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT security
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
Protocols
learning (artificial intelligence)
machine learning
machine learning model
machine learning techniques
malware
malware detection
Metrics
network security
IoT security
pubcrawl
Resiliency
Scalability
Training
Zero-day attacks
Zero-Day DDoS Attack
zero-day DDoS attacks
Human Factors
Computer crime
computer network security
Data models
DDoS attack detection
detection framework
honey pots
honeypot-based approach
Human behavior
composability
Internet of Things
invasive software
IoT botnet DDoS attacks
IoT Botnets
IoT honeypot
IoT Honeypots
IoT malware
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Making IoT security policies relevant, inclusive and practical for people: A multi-dimensional method
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
collaboration
deliberation
design
IoT security
Policy Based Governance
policy-based governance
pubcrawl
simulation
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »