Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
Protocols
IPv6 Conformance Test
conformance testing
Automatic testing
Mission critical systems
IPv6
Policy Based Governance
military communication
composability
collaboration
performance evaluation
network security
IoT devices
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Challenges of DDoS Attack Mitigation in IoT Devices by Software Defined Networking (SDN)
Submitted by grigby1 on Wed, 04/13/2022 - 10:27am
Metrics
software defined networking
security
SDN architecture
Resiliency
resilience
pubcrawl
performance evaluation
network architecture
composability
IoT devices
Internet of Things
Human behavior
denial-of-service attack
DDoS attacks mitigation
DDoS Attacks
DDoS attack mitigation
computer architecture
biblio
Security Analysis and Prevention of Attacks on IoT Devices
Submitted by grigby1 on Wed, 09/08/2021 - 9:33am
Logic gates
Wireless fidelity
tools
smart devices
Resiliency
resilience
pubcrawl
Pins
NodeMCU
Metrics
Arduino IDE
IoT devices
IEEE 802.11 Standard
Human behavior
home security
DoS Attack Prevention
DHT11 Sensor.
DDoS Attack Prevention
Computer crime
composability
biblio
SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine
Submitted by grigby1 on Thu, 05/13/2021 - 2:09pm
malware
Software
Secure-boot
Resiliency
resilience
Remote Attestation
pubcrawl
Prototypes
Protocols
performance evaluation
attack resilience
IoT devices
Intelligent Embedded Systems
Human behavior
Fault Tolerant and Trusted Embedded Systems
embedded system architecture
computer architecture
composability
attestation
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
IOTA Tangle
web of trust approach
Trusted Computing
trusted authority
Trust Management Framework
Trust framework
sensors
self sovereign identity
self sovereign identities
Scalability
Resiliency
resilience
quantifiable trust
pubcrawl
proprietary environments
permissionless environment
web of trust
IoT devices
Internet of Things devices
Internet of Things
IDMS
identity management system
Identity management
Human behavior
enclosed environments
DLT's network
Distributed Ledger Technology
Distributed databases
decentralized Identity
automatic trust rating
authorisation
arbitrary identities
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
remote patient monitoring
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
medical information systems
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
health care
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
blockchain
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
1
2
3
4
5
6
7
8
9
next ›
last »