Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor security
biblio
An intelligent security system for autonomous cars based on infrared sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
nonsafety applications
ICMetric technology
ICmetrics
infrared detectors
infrared sensors
Integrated Circuit Metric technology
intelligent security system
Intelligent Transportation Systems
Intrusion Detection
mobile robots
Hacking
notification messages
road safety
road vehicles
self-driving vehicles
simulated vehicular ad hoc network
traffic engineering computing
unique extracted features
sensor security
security system
pubcrawl
Resiliency
Human behavior
Human Factors
feature extraction
composability
security of data
vehicular ad hoc networks
Metrics
telecommunication security
automobiles
autonomous cars
autonomous vehicle system
autonomous vehicles
awareness messages
control data authentication
external communication systems
biblio
Deployment and analysis of honeypots sensors as a paradigm to improve security on systems
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
security of data
sensor security
Sensor Systems
security breaches
safety gaps
Ports (Computers)
honeypots
honeypot sensors deployment
attacker
Servers
Metrics
Protocols
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Intrusion Detection
security
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
Secure Data Collection in Spatially Clustered Wireless Sensor Networks
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
Data collection
sensor security
wireless sensor networks
Wireless Sensor Network
node compromise
Correlation
Clustering algorithms
cluster
Monitoring
security
sensors
composability
Human Factors
Human behavior
Resiliency
pubcrawl
Energy
Metrics
biblio
Sensor data validation and abnormal behavior detection in the Internet of Things
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
Monitoring
sensor security
Temperature sensors
Temperature measurement
sensor data flow
Logic gates
actuators
abnormal behavior
temperature
security
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Anomaly Detection
Metrics
biblio
Efficient distribution of fragmented sensor data for obfuscation
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
Java
sensor security
sensors
Routing
Prototypes
emulation
Distributed databases
Data fragmentation
computer security
Metrics
Cryptography
composability
obfuscation
Human Factors
Human behavior
Resiliency
pubcrawl
biblio
Development of the Hierarchal Trust Management System for Mobile Cluster-based Wireless Sensor Network
Submitted by grigby1 on Tue, 09/05/2017 - 1:49pm
Anomaly Detection
attacks
authenticity
clustering
Human behavior
Intrusion Detection
pubcrawl
Resiliency
Scalability
sensor security
trust
wireless sensor networks
biblio
Trusted Sensors for Participatory Sensing and IoT Applications Based on Physically Unclonable Functions
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
Human behavior
Internet of Things
Mobile Applications
participatory sensing
privacy
pubcrawl
PUF
Resiliency
Scalability
sensor security
Tamper resistance
trust
trusted sensors
biblio
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
authentication
Behavioral biometrics
driving behavior modeling
Human behavior
pubcrawl
Resiliency
Scalability
sensor security
biblio
Effective Algorithm for Protecting WSNs from Internal Attacks in Real-time
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
Dempster-Shafer Theory
Human behavior
internal attacker
net work security
pubcrawl
Resiliency
Scalability
sensor security
wireless sensor network (WSN)
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »