Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT security
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 4:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
tools
wearables security
Wearable devices
wearable computers
symmetric cryptography
secure authentication process
lightweight cloud-assisted mutual authentication scheme
IoT authentication
cloud-assisted authentication scheme
Authentication Protocols
Wireless fidelity
IoT security
public key cryptography
message authentication
authentication
security
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
telecommunication security
data privacy
Servers
Scalability
Cloud Computing
IoT
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 9:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
Listen!: Audio-based Smart IoT Device Pairing Protocol
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Scalability
Resiliency
pubcrawl
policy-based governance
IoT security
Human Factors
Smart Home
context-based pairing
zero-interaction
zero trust
biblio
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
repetitive operational profile
physical damage
Physical damage control
Physical Threats in IoT
PLC
policy-based governance
programmable controllers
programmable logic controller
pubcrawl
operating devices
Resiliency
response system
SCADA server
SCADA systems
SCADA Systems Security
security
security of data
system monitoring
destructive attacks detection
actuator security
actuators
composability
Compositionality
Computer worms
CPS
cyber-physical system security
cyber-physical systems
actuator
Hardware
Human behavior
IoT security
malicious operation
Metrics
middleware
middleware security
Monitoring
file
Safeguarding Mobile Cloud Services New Challenges and Solutions
Submitted by XiaoFeng Wang on Wed, 01/08/2020 - 3:18pm
Project Slides
Software
Systems
Cloud Security
Mobile Security
IoT security
1618493
SaTC PI Meeting 2019
biblio
IoTSM: An End-to-End Security Model for IoT Ecosystems
Submitted by grigby1 on Wed, 10/30/2019 - 9:30am
security
IoTSM
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
Science of Security
secure development
IoT security model
security model
security of data
Security Practices
Software
software assurance
software assurance maturity model framework
telecommunication security
Internet of Things
Companies
comparability
composability
Ecosystems
end-to-end IoT security
end-to-end security
end-to-end security model
Human behavior
collaboration
Interviews
IoT
IoT devices
IoT ecosystems
IoT organizations
IoT practitioners
IoT security
biblio
SPEED: Secure Provable Erasure for Class-1 IoT Devices
Submitted by aekwall on Mon, 09/23/2019 - 9:25am
Resiliency
pubcrawl
IoT security
Predictive Metrics
distance bounding
memory isolation
secure erasure
provable security
Compositionality
biblio
Identity Federation for Cellular Internet of Things
Submitted by grigby1 on Mon, 08/26/2019 - 10:09am
composability
cross layer identity federation
Cross Layer Security
cyber security
IoT security
Mobile Identity Management
mobile network security
pubcrawl
resilience
Resiliency
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »