Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bluetooth security
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 4:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Data mining
bluetooth security
Frontline BPA Low Energy Analyzer
Bluetooth special interest group
Bluetooth Smart
bluetooth low energy
Bluetooth LE security
Bluetooth LE devices
Bluetooth LE connection
Bluetooth devices
Bluetooth
computer network security
smart phones
composability
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
Protocols
encryption
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
Design of an IoT Based Warfare Car Robot Using Sensor Network Connectivity
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
IoT
Resiliency
Human behavior
pubcrawl
composability
sensor network
Raspberry Pi
robot designing
smart war
bluetooth security
biblio
My Magnetometer Is Telling You Where I'Ve Been?: A Mobile Device Permissionless Location Attack
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Resiliency
Human behavior
pubcrawl
composability
bluetooth security
biblio
Detecting Smartphone State Changes Through a Bluetooth Based Timing Attack
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Resiliency
Human behavior
pubcrawl
composability
privacy
Bluetooth
Change point detection
L2CAP
smartphone
Timing attack
bluetooth security
biblio
Talking to GNOMEs: Exploring Privacy and Trust Around Internet of Things Devices in a Public Space
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Resiliency
Human behavior
pubcrawl
composability
privacy
natural language
3D printing
bluetooth beacons
chatbots
eddystone
public engagement
bluetooth security
biblio
Cross-App Tracking via Nearby Bluetooth Low Energy Devices
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Bluetooth
bluetooth security
composability
Human behavior
privacy
pubcrawl
Resiliency
tracking
biblio
Testing Vulnerabilities in Bluetooth Low Energy
Submitted by aekwall on Mon, 04/01/2019 - 10:05am
security
Resiliency
Human behavior
pubcrawl
composability
bluetooth low energy
bluetooth vulnerabilities
bluetooth security
« first
‹ previous
1
2
3
4
5
6
next ›
last »