Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
middleware security
biblio
ChainFS: Blockchain-Secured Cloud Storage
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
forking attacks
trusted Blockchain
storage management
Servers
security of data
Resiliency
resilience
Public key
pubcrawl
policy-based governance
middleware system
middleware security
middleware
History
Fuses
Amazon S3 cloud storage
fork consistency
file-system interface
file system
file operation logging
composability
cloud-storage security
cloud storage services
cloud storage
Cloud Security
Cloud Computing
ChainFS middleware
ChainFS data file storage
blockchain-secured cloud storage
blockchain
biblio
A PSO clustering based RFID middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
policy-based governance
security of data
security
RFID middleware
Resiliency
resilience
radiofrequency identification
radio frequency identification
pubcrawl
PSO clustering scheme
PSO clustering
Acceleration
particle swarm optimization
particle swarm optimisation
middleware security
middleware
Data Security
data availability
convergence
composability
Clustering algorithms
Birds
biblio
Middleware Based Node Authentication Framework for IoT Networks
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
node authentication framework
wireless sensor networks
security of data
security mechanism
security
Resiliency
resilience
pubcrawl
policy-based governance
authentication
Network
middleware security
middleware
IoT networks
Internet of Things
internet
Conferences
composability
biblio
Study of security algorithms to secure IOT data in middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
middleware
security of data
security algorithms
Resiliency
resilience
pubcrawl
privacy
policy-based governance
middleware security
cloud
IoT data
IoT
Internet of Things
fog
data privacy
composability
Cloud System
Cloud Computing
biblio
Critical Aspects Pertaining Security of IoT Application Level Software Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
Vulnerability
standards
Software systems
software security
security of data
security
Resiliency
resilience
pubcrawl
Protocols
privacy issues
policy-based governance
application level software systems
middleware
IoT devices
IoT
Internet of Things security
Internet of Things
Insecure Software/Firmware
insecure software
Insecure Interfaces
data privacy
Constrained Application Protocol
composability
CoAP
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
WSNs
WSN
wireless sensor networks
wireless sensor network middleware
visualization
unsupervised learning technique
Unsupervised Learning
sensors
security problems
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
composability
middleware
malicious attacks
machine learning
learning (artificial intelligence)
intelligent middleware
Generators
generator
Generative Adversarial Networks algorithm
GANs
gan
Gallium nitride
fake data
detector
Data Transmission
confusion matrix
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
repetitive operational profile
physical damage
Physical damage control
Physical Threats in IoT
PLC
policy-based governance
programmable controllers
programmable logic controller
pubcrawl
operating devices
Resiliency
response system
SCADA server
SCADA systems
SCADA Systems Security
security
security of data
system monitoring
destructive attacks detection
actuator security
actuators
composability
Compositionality
Computer worms
CPS
cyber-physical system security
cyber-physical systems
actuator
Hardware
Human behavior
IoT security
malicious operation
Metrics
middleware
middleware security
Monitoring
biblio
A smart middleware to detect on-off trust attacks in the Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
security of data
on-off trust attacks
performance evaluation
Pervasive Computing Security
policy-based governance
pubcrawl
real-time systems
Resiliency
security
On-Off Attacks
sensors
service providers
service requesters
smart middleware
sophisticated trust threat
trust
Trusted Computing
complex environment
node behavior
middleware security
middleware
Metrics
malicious device
low trust node
IoT Security 2018
IoT resources trust
Internet of Things designs
Internet of Things
internet
Human behavior
heterogeneous environment
Data models
composability
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
« first
‹ previous
1
2
3
4
next ›
last »