Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet-of-Things
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 1:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
biblio
An Auditing Framework for Vulnerability Analysis of IoT System
Submitted by aekwall on Mon, 03/09/2020 - 10:06am
IoT device
Security Audits
security frameworks
resource constraint nature
open-source tools
open-source framework
communication vulnerabilities
auditing framework
auditing
virtual world
framework
IoT system
physical world
IoT
Scalability
Internet-of-Things
firmware
public domain software
Vulnerability Analysis
pubcrawl
Human behavior
Resiliency
security
Internet of Things
security of data
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 3:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
file
AquaSCALE: Exploring Resilience of Community Water Systems
Submitted by Nalini Venkatasub... on Thu, 01/16/2020 - 3:12pm. Contributors:
Nalini Venkatasubramanian
Sharad Mehrotra
Qing Han
Praveen Venkateswaran
Phu Nguyen
Kuo-Lin Hsu
Soroosh Sorooshian
Ronald T. Eguchi
Georgiana Esquivias
Daniel Hoffman
resilience
Water Infrastructure
distribution networks
Internet-of-Things
Posters
1528995
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
1
2
3
4
next ›
last »