Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor security
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network reliability
sensor security
selective forwarding attacks
selective forwarding attack
security attacks
security
Routing protocols
Routing
robust recovery schemes
Resiliency
reliable transmission scheme
cluster head
Protocols
Predictive Metrics
network coding
Metrics
malicious security attacks
low energy adaptive clustering hierarchy
LEACH protocol
Human behavior
encoding
diversity coding
delays
cyber physical systems
composability
cluster routing protocols
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 2:21pm
security of data
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
Monitoring
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
embedded security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
artificial intelligence security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
security system
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
level measurement
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
microcontrollers
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
security
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
Metrics
Zigbee
WSN security
wireless sensor networks
wireless security
wireless communication devices
Wireless communication
telecommunication security
sensor security
Resiliency
pubcrawl
poor wireless communication
performance evaluation
mutual authentication
authentication
low-performance sensors
low performance communication ability
lightweight mutual authentication
key agreement
IoT security
IoT network
Internet of Things
Human behavior
high-quality communication
Cryptographic Protocols
composability
communication functions
biblio
Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
physical devices
WSN security
wireless sensor networks
Support vector machines
sensor security
security threats
security of data
security
Resiliency
pubcrawl
Artificial Neural Networks
Neural networks
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT security
Internet of Things
Human behavior
composability
biblio
Leveraging Secure Multiparty Computation in the Internet of Things
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
Internet of Things
Resiliency
Human behavior
pubcrawl
composability
Metrics
secure multiparty computation
sensor data
Smart Environments
sensor security
biblio
VirtSense: Virtualize Sensing Through ARM TrustZone on Internet-of-Things
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
Resiliency
Human behavior
pubcrawl
composability
Metrics
ARM TrustZone
IoT security
sensor network
sensor virtualization
sensor security
biblio
Post-quantum Security Using Channel Noise
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
physical layer security
composability
Control Theory
finite-length regime
Human behavior
information theoretic security
information-theoretic security
Metrics
physical-layer security
post-quantum security
pubcrawl
Resiliency
security
sensor security
wiretap channel
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »