Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT systems
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
Use of Machine Learning in Detecting Network Security of Edge Computing System
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
Training
Support vector machines
support vector machine
Smart homes
smart home system
Resiliency
resilience
RBF-function SVM method
radial basis function networks
pubcrawl
privacy
network security detection
mutation code detection
Alibaba ECS
learning (artificial intelligence)
IoT systems
Internet of Things
home automation
Hardware
feature extraction
edge computing system
edge computing
computer network security
composability
code mutation
Cloud Computing
biblio
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Internet of Things systems
symmetric-key algorithm
simple round function
security attacks
security and performance analysis
Scalability
Resiliency
Radio frequency
pubcrawl
plaintext messages
Lightweight flexible key dependent cipher scheme
lightweight cryptographic algorithms
Lightweight Ciphers
lightweight cipher scheme
IoT systems
IoT devices
cipher variants
Internet of Things
input message
Heuristic algorithms
flexible lightweight cipher
flexible cipher scheme
dynamic Operation mode
dynamic key approach
dynamic cryptographic primitives
data confidentiality
Cryptography
confidentiality attacks
Conferences
computer network security
Ciphers
biblio
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT
SxC framework
Software
Smart homes
Smart Home
security-by-contract
security
Scalability
Resiliency
pubcrawl
IoT systems
IoT devices
IoT device contract
Cloud Computing
Internet of Things
human beings lives
home automation
fog computing distributed paradigm
Fog Computing and Security
Fog computing
edge computing
contracts
contract-policy matching
consolidated reality
computer network security
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Constant Time, Fixed Memory, Zero False Negative Error Logging for Low Power Wearable Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
traditional error logging algorithms
pubcrawl
Reliability
resilience
Resiliency
run-time error logging
Scalability
security
Sensor Systems
privacy
wearable computers
Wearable devices
Wearable sensors
wearables security
Wireless communication
wireless sensor networks
wireless wearable embedded devices
zero false negative error
false positive error rate
Caching Algorithm
Conferences
constant insertion time
constant memory
constant time
embedded devices
Error Logging
error logging algorithm
Body Sensors
firmware
firmware faults
fixed memory
hashing
Human behavior
Internet of Things
IoT systems
low power wearable devices
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Monitoring
telecommunication traffic
Switches
software defined networking
Software
SDN
sampling-based anomaly detection
Routing
Resiliency
real-time systems
pubcrawl
OpenFlow
network security
ADS
Metrics
IoT systems
Internet of Things
Human behavior
DDoS attack mitigation
DDoS Attack
core networks
computer network security
Computer crime
composability
anomaly detection systems
anomaly detection algorithm
biblio
A Distributed Graph Database for the Data Management of IoT Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
graph edge property
social computing
security
REST API
Resiliency
pubcrawl
middleware
IoT systems
IoT
Internet of Things
green computing
graph theory
Access Control
graph database operations
graph database
distributed system
distributed graph database
Distributed databases
data management
Conferences
composability
collaboration
application program interfaces
access protocol permissions
« first
‹ previous
1
2