Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
BLE
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
low power consumption
WMN
wireless mesh networks
Wireless Mesh Network Security
wireless
telecommunication security
security
Resiliency
resilience
pubcrawl
Protocols
mesh support capability
MESH network
ad-hoc networking technologies
Human behavior
cyber physical systems
Cyber Physical System
composability
Communication networks
bluetooth security
Bluetooth low energy mesh network technology
bluetooth low energy
Bluetooth
BLE security protocols
BLE mesh network security mechanisms
BLE
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by aekwall on Mon, 01/20/2020 - 10:46am
energy efficient tree algorithm
ultralow energy consumption
tree network
telecommunication power management
telecommunication network reliability
resource-constrained devices
Resiliency
pubcrawl
Protocols
network lifetime
multihop routing
multihop BLE networks
IoT
fast growing protocol
expandability
BLE
Energy Efficiency
energy dissipation
energy consumption profile
energy conservation
constrained-resource nodes
composability
complex systems
Bluetooth low energy networks
bluetooth low energy
Bluetooth
BLE static constrained-resources networks
BLE mesh
BLE expandability problem
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Internet of Things BLE Security
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
ACM
BLE
bluetooth security
biblio
Seamless and Secure Bluetooth LE Connection Migration
Submitted by grigby1 on Thu, 08/23/2018 - 10:35am
IoT
pubcrawl
Resiliency
Human behavior
composability
resilience
human factor
BLE
connection migration
bluetooth security
biblio
Impact of the Physical Web and BLE Beacons
Submitted by grigby1 on Wed, 05/17/2017 - 12:51pm
eddystone
Scalability
Resiliency
pubcrawl
physical web
Metrics
ibeacon.
Human behavior
eddystone-url
beacons
cybersecurity education
Cybersecurity
computer security
composability
collaboration
bluetooth security
Bluetooth
BLE
biblio
Applications of Secure Location Sensing in Healthcare
Submitted by grigby1 on Wed, 05/17/2017 - 12:51pm
beacon
BLE
bluetooth security
composability
Human behavior
location sensing
pubcrawl
Resiliency