Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT systems
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT systems
Cross Layer Security
XLF
unprecedented opportunities
pervasive IoT applications
paramount threats
cross-layer framework
cross-layer approach
Cross Layer
comprehensive protection
composability
IoT
privacy
batteries
pubcrawl
Resiliency
Protocols
security
Hardware
Internet of Things
Cloud Computing
security of data
biblio
Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware
Submitted by grigby1 on Thu, 07/30/2020 - 2:14pm
IoT devices
security
secure IoT system
REST API
Resiliency
resilience
representational state transfer API
pubcrawl
middleware
Metrics
Logic gates
IoT systems
IoT security
application program interfaces
IoT applications
IoT
Internet of Things
Human Factors
Human behavior
fairly disruptive technology
data privacy
computer network security
composability
Cloud Computing
authorization
authentication
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
methodology
Software Architecture
Security Properties
security of data
security
Resiliency
resilience
reference architecture-based methodology
pubcrawl
operational security services
object-oriented programming
object oriented security
Metrics
architecture
ISO standards
IoT-enabled applications
IoT systems
IoT
Internet of Things
IEC standards
ERAMIS methodology
design features
computer architecture
composability
complexity
Business
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
1
2
next ›
last »