Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bluetooth security
biblio
Multi-level Bluetooth Intrusion Detection System
Submitted by grigby1 on Thu, 06/24/2021 - 10:51am
Intrusion Detection
whitelisting
security
Resiliency
resilience
pubcrawl
Protocols
performance evaluation
Monitoring
Anomaly based Intrusion Detection
Internet of Things (IoT)
IEEE 802.15.1
composability
bluetooth security
Bluetooth
Biomedical monitoring
Autonomic Security
biblio
Design and Realization of Smart Home Security System Based on AWS
Submitted by grigby1 on Mon, 12/28/2020 - 12:30pm
Wireless fidelity
Wi-Fi access
software design
smart home security system
sensor systems and applications
PSoC
aws iot
bluetooth security
Smart homes
Internet of Things
testing
composability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
LA-ANA based Architecture for Bluetooth Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
autonomic network
Wireless Personal Area Network
unicast packet delivery
stochastic model
Piconet
multiple sensor node technology
multicast packet delivery
LACAS based wireless sensor network
LACAS
LA-ANA based architecture
dynamic environment
Bluetooth environment
Bluetooth based dynamic environment
Autonomic Network Architecture (ANA)
Bluetooth
bluetooth security
multicast communication
Fault tolerant systems
fault tolerance
telecommunication congestion control
composability
wireless sensor networks
Mathematical model
Throughput
Resiliency
resilience
Human behavior
pubcrawl
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
Design of a Smart Home System Using Bluetooth Protocol
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security systems
unit system
Sensor
printed circuit layout
peripheral interfaces
Peripheral interface controller microcontroller
PCB layout design
Micro-controller
main processer
home processes
fully functional smart home prototype
Diptrace software
centralized control unit
Bluetooth protocol
Bluetooth based smart home automation system
bluetooth security
Bluetooth
Home appliances
Bars
relay
mobile phones
Smart homes
microcontrollers
Switches
home automation
composability
Protocols
Resiliency
resilience
Human behavior
pubcrawl
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
1
2
3
4
5
6
next ›
last »