Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet-of-Things
biblio
Flexible Certificate Revocation List for Efficient Authentication in IoT
Submitted by aekwall on Mon, 09/23/2019 - 9:25am
authentication
certificate revocation list
Compositionality
Human behavior
Internet-of-Things
Metrics
Predictive Metrics
PKI Trust Models
provable security
pubcrawl
public key infrastructure
Resiliency
Scalability
biblio
Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Submitted by grigby1 on Mon, 08/26/2019 - 10:09am
Internet-of-Things
Trusted Computing
service cross-layered system
sensors
security of data
security assessment as a service
SAaaS
Resiliency
resilience
pubcrawl
Monitoring
Medical services
IT healthcare ecosystem
Cloud Computing
Internet of Things
Healthcare
health care
digital-personalised-trusted healthcare
cybersecurity risk
Cybersecurity
cyber threats
cyber aware environment
Cross Layer Security
computer security
composability
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
Deriving Privacy and Security Considerations for CORE: An Indoor IoT Adaptive Context Environment
Submitted by aekwall on Mon, 05/20/2019 - 8:58am
security
Resiliency
Human behavior
pubcrawl
composability
Metrics
privacy
Ambient intelligence
architectural framework
Internet-of-Things
IoT Security 2018
biblio
Deploying Robust Security in Internet of Things
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
risk management
worst-case security risks
uncertainty
Stochastic processes
stochastic model
Stochastic computing
security risk
security offloading
security of data
security incidents
security
Scalability
Robustness
robust security
risk measurement
Cloud Computing
resource-constrained nature
Resiliency
pubcrawl
optimal robust deployment
offloaded security mechanisms
IoT system
IoT security
IoT devices
Internet-of-Things
Internet of Things
expected case security risks
conditional value-at-risk
Communication networks
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
Resolving Threats in IoT: ID Spoofing to DDoS
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
IP networks
Zigbee
unique identity
security of data
resource-constrained network
Resiliency
pubcrawl
PseudoRandom Identity Generator
Protocols
PRIG-adapted 6LoWPAN
personal area networks
personal area network model
Peer-to-peer computing
malware
malicious machines spoof ID
IP-enabled devices
6LoWPAN
IoT
invasive software
Internet-of-Things
Internet of Things
ID validation time
ID spoofing vulnerabilities
ID Spoofing
DDoS stress
DDoS
computer network security
Computer crime
composability
botnet
administrative machines
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
« first
‹ previous
1
2
3
4
next ›
last »