Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
M2M
biblio
Implementing Security and Trust in IoT/M2M using Middleware
Submitted by grigby1 on Mon, 08/02/2021 - 3:21pm
composability
information security
internet
IoT
M2M
machine-to-machine communications
middleware
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
security
sensors
standards
wireless sensor networks
biblio
A Direct Anonymous Attestation Scheme Based on Mimic Defense Mechanism
Submitted by grigby1 on Thu, 05/13/2021 - 2:08pm
machine-to-machine communications
Servers
Resiliency
resilience
Public key
pubcrawl
Protocols
privacy
mimic defense
Active Defense
M2M
Internet of Things
Human behavior
Hash functions
composability
attestation
anonymous attestation
biblio
Novel Anomaly Detection and Classification Schemes for Machine-to-Machine Uplink
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
Monte Carlo methods
low-false alarm rate
low-volume sophisticated attacks
M2M
M2M emergency
machine-to-machine communications
machine-to-machine networks
machine-to-machine uplink
Measurement
Metrics
modified Canberra distance metric
low-complexity
Monte-Carlo simulations
pubcrawl
resilience
Resiliency
Scalability
sensors
standard information technology systems
terminal device failures
volumetric anomaly detection
emergency scenarios
anomaly detection schemes
big data security
classification schemes
Computer crime
computer network security
cyber-attacks
cyber-vulnerabilities
DDoS Attack
Device failures
distributed denial-of-service attacks
Anomaly Detection
Engines
feature extraction
feature-based detection schemes
general M2M uplink
high false-alarm rate
internet
intrusion detection schemes
IT networks
legitimate M2M connections
biblio
Group Access Authentication of Machine to Machine Communications in LTE Networks
Submitted by grigby1 on Wed, 09/05/2018 - 10:54am
security
pubcrawl
Resiliency
resilience
M2M
EPS-AKA
group authentication
MTC
controller area network security
biblio
IoT Security Hardware Framework for Remote Maintenance of Legacy Machine Tools
Submitted by K_Hooper on Wed, 05/02/2018 - 10:47am
cyber-secure manufacturing
Human behavior
IoT
M2M
machine tools
Metrics
pubcrawl
remote maintenance
Scalability
Tamper resistance
tamper resistant design
biblio
Coexistence of cellular IOT and 4G networks
Submitted by grigby1 on Thu, 04/20/2017 - 12:34pm
Internet of Things
Resiliency
pubcrawl
NB-IOT
Metrics
machine-to-machine communications
M2M applications
M2M
LTE
Long Term Evolution
Logic gates
Load management
3GPP
Human behavior
coupled CIOT-LTE architecture
computer architecture
collaboration
clean slate CIOT network
clean slate
cellular radio
cellular IoT network
Cellular IOT (CIOT)
4G network
4G mobile communication
file
Asymptotically-Safe Formation Control in Vehicular Networks Communicating over Wireless Radio Channels
Submitted by lemmon@nd.edu on Thu, 02/20/2014 - 12:07pm. Contributors:
Michael Lemmon
Bin Hu
J.N. Laneman
Hai Lin
CPS Domains
Automotive
Communication
Control
Wireless Sensing and Actuation
Transportation
CPS Technologies
Foundations
communication
M2M
networks
sensors
vehicle
CFP Submissions
CFP Paper Submissions
2014 National Workshop on Transportation CPS
2014
Academia
Position Paper
Publications
file
M2M: The Wireless Revolution - A Technology Forecast by Brazell et al
Submitted by theartofthefuture on Wed, 01/25/2012 - 11:15am
Energy Efficient Buildings
SCADA Systems
Automotive
CPS Domains
Medical Devices
Aerospace
Smart Grid
Ground Vehicles
Design Automation Tools
Embedded Software
Defense
Energy
Critical Infrastructure
Health Care
Manufacturing
Robotics
Transportation
Education
industry
Markets
Community Colleges
Machine-to-Machine Computing
Technicians
M2M
Academia
Report