Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bluetooth security
biblio
BASTION-SGX: Bluetooth and Architectural Support for Trusted I/O on SGX
Submitted by aekwall on Mon, 04/01/2019 - 9:05am
IoT
SGX
Resiliency
Human behavior
pubcrawl
composability
Bluetooth
trusted I/O
bluetooth security
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
biblio
Microblogging in a Privacy-Preserving Way
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
anonymous messaging
anonymity
bluetooth security
composability
Homomorphic encryption
Human behavior
human factor
Microblogging
ORAM
privacy
pubcrawl
resilience
Resiliency
biblio
Breaking BLE Beacons For Fun But Mostly Profit
Submitted by grigby1 on Thu, 08/23/2018 - 10:36am
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
bluetooth security
biblio
Internet of Things BLE Security
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
ACM
BLE
bluetooth security
biblio
Seamless and Secure Bluetooth LE Connection Migration
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
IoT
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
BLE
connection migration
bluetooth security
biblio
Security throwbot
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
composability
Wireless fidelity
Wireless Connectivity
sensors
security throwbot
security issues
security
Accelerometers
actuators
Bluetooth
bluetooth security
Cameras
Resiliency
control engineering computing
Human behavior
human computer interaction
human factor
human-to-computer interaction
Internet of Things
mobile robots
pubcrawl
resilience
IoT
biblio
Intelligent security lock
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
intrusion detection system
software system
smart electronic/digital door locking system
Smart Door Lock
security features
Resiliency
resilience
real time camera surveillance
pubcrawl
mobile computing
Mobile app
message authentication
lock device
Live Camera Feeds
keys (locking)
Bluetooth
intrusion detection notification
Intrusion Detection
Intelligent Security Lock prototype
human factor
Human behavior
face recognition
doors
Conferences
comprehensive security requirements
composability
Cameras
bluetooth security
Bluetooth Lock
authentication
biblio
Bluetooth for decoy systems: A practical study
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
Monitoring
Wireless communication
telecommunication security
Servers
security
Resiliency
resilience
Raspberry Pi
pubcrawl
performance evaluation
bluetooth security
low energy bluetooth
human factor
Human behavior
decoy system
Conferences
composability
Arduino boards
Bluetooth
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
« first
‹ previous
1
2
3
4
5
6
next ›
last »