Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
load balancing technology
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
Fog Radio Access Network
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
delays
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
5G mobile communication
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 1:19pm
side-channel attacks
Information Reuse and Security
trusted execution environments
TEE integration time
software partitioning
RPC-based solutions
RPC-based framework
RPC based framework
RPC
remote procedure calls
partitioning security components
partitioning
IoT security software
interface definition language files
graphical user interface
graphical user interfaces
security of data
framework
TEE
Compositionality
information security
Java
software engineering
Python
Libraries
pubcrawl
Resiliency
Protocols
security
IoT devices
Internet of Things
Servers
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
IoT Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:12pm
machine learning
Ollydebug
IoT malware analysis
information system integrity
information system confidentiality
information system availability
CIA triad
malicious users
malicious software
Predictive Metrics
malware attacks
Malware Analysis
image recognition
privacy
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
data integrity
IoT devices
Internet of Things
Conferences
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
grid stability
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
open systems
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
Permissioned Blockchains
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
data privacy
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »