Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor security
biblio
Random Number Generator Based on Hydrogen Gas Sensor for Security Applications
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
petrochemical field
hydrogen gas sensor
II-VI semiconductor materials
microfabrication
microfabrication techniques
nanowires
NIST 800-22 statistical randomness test
nondeterministic noise
nuclear reactors
Hydrogen
random number generation
random number generator
security applications
security of industry applications
thermal noise
thermal noise information
Zinc oxide
sensor security
cryptographic applications
Resiliency
Human behavior
pubcrawl
composability
Metrics
Entropy
Generators
statistical analysis
Cryptography
entropy source
fuel cells
Gas detectors
gas sensor based RNG
gas sensors
hash function SHA-256
high-quality random number generator
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
CMOS integrated circuits
sensor security
time 19.7 ms
tamper-resistant enclosures
SNR
size 350.0 nm
sensor fusion
Semiconductor device measurement
physical interaction
physical attacks
noise figure 94.6 dB
integrated circuits
integrated circuit packaging
Electrodes
electrode matrix
CMOS technology
security
Capacitors
capacitive touch technology
capacitive sensors
capacitive multichannel security sensor IC
capacitance measurement
capacitance 460.0 aF
capacitance 35.0 aF
Capacitance
Metrics
composability
pubcrawl
Human behavior
Resiliency
embedded devices
biblio
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
man-in-the-middle
Sensors and Actuators
sensor spoofing
sensor security
security
Resiliency
pubcrawl
physical attacks
Metrics
actuator security
IoT security
Internet of Things (IoT)
Human behavior
Device Fingerprinting
cyber physical systems
CPS/ICS Security
composability
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Metrics
smartwatch
smartphone user authentication
smartphone
smart phones
sensors
Sensor Systems
sensor security
Sensor phenomena and characterization
security of data
security
Resiliency
pubcrawl
privacy
mobile computing
Accelerometers
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
Global Positioning System
Feature Selection
contextual machine learning
context-based authentication models
context detection
Context
composability
Biomedical monitoring
authentication
biblio
Estimation of safe sensor measurements of autonomous system under attack
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
car-follower model
sensor security
security concerns
safety-critical software
safety concerns
safe sensor measurements
recursive least square algorithm
radar antennas
Radar
message authentication
estimation
delay injection
challenge response authentication technique
Metrics
autonomous system
attack vector
delays
Mathematical model
Computer crime
sensors
composability
Human Factors
Human behavior
Resiliency
pubcrawl
cyber-physical systems
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
wireless sensor networks
sensor security
sensor networks
sensor network integration
network servers
IoT gateway
IoT devices
internetworking
information centric networking
ICN
heterogeneous sensor networks
FOGG
fog computing based gateway
Fog computing
edge computing
security
Logic gates
IP networks
internet
Cloud Computing
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Apply a wireless line sensor system to enhance distribution protection schemes
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
supervisory control and data acquisition system
power distribution faults
power distribution protection
power distribution reliability
pubcrawl
Relays
Resiliency
SCADA systems
sensor security
Metrics
upstream protection devices
Wireless communication
Wireless communications
wireless line sensor system
wireless line sensors
wireless protection sensor system
wireless sensor networks
fault location
Communication system security
composability
data acquisition
distribution protection schemes
distribution system protection
Fault currents
fault diagnosis
fault information
Circuit faults
fault status
faulted circuit indicators
faulted line sections
Fuses
Human behavior
Human Factors
local visual indication
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »