Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
IoT environment
white-box cryptography based data encryption-decryption scheme
white-box cryptography
White Box Security
white box cryptography
transportation monitoring
symmetric encryptions algorithms
resource constrained environments
Resiliency
resilience
pubcrawl
pedestrian levels
Metrics
medical devices
Matrix decomposition
manufacturing process
advanced encryption standard
IoT devices
Internet of Things
infusion pumps
implanted devices
encryption
encoding
differential attacks
Cryptography
computer network security
composability
code lifting attacks
Ciphers
cipher block chaining mode
CBC mode.
Block Cipher
biblio
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Internet of Things systems
symmetric-key algorithm
simple round function
security attacks
security and performance analysis
Scalability
Resiliency
Radio frequency
pubcrawl
plaintext messages
Lightweight flexible key dependent cipher scheme
lightweight cryptographic algorithms
Lightweight Ciphers
lightweight cipher scheme
IoT systems
IoT devices
cipher variants
Internet of Things
input message
Heuristic algorithms
flexible lightweight cipher
flexible cipher scheme
dynamic Operation mode
dynamic key approach
dynamic cryptographic primitives
data confidentiality
Cryptography
confidentiality attacks
Conferences
computer network security
Ciphers
biblio
Protecting the Internet of Things with Security-by-Contract and Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT
SxC framework
Software
Smart homes
Smart Home
security-by-contract
security
Scalability
Resiliency
pubcrawl
IoT systems
IoT devices
IoT device contract
Cloud Computing
Internet of Things
human beings lives
home automation
fog computing distributed paradigm
Fog Computing and Security
Fog computing
edge computing
contracts
contract-policy matching
consolidated reality
computer network security
biblio
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
natural gas technology
while broad scenarios
smart port
smart offshore oil
smart airport
security threats
security of data
security issues
security
sea ports
Scalability
Resiliency
pubcrawl
oil technology
offshore installations
Airports
multiaccess edge computing paradigms
IoT devices
Internet of Things
general security requirements
gas extraction field
Fog Computing and Security
Fog computing
FMEC solutions
edge computing
critical infrastructures
communication technologies
Cloud Computing
CI
biblio
Fog-Based Internet of Things: A Security Scheme
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
IoT devices
traditional data center
time-sensitive applications
security scheme
Scalability
response time
Resiliency
pubcrawl
Protocols
nearby light-weight middleware
MQTT protocol
MQTT
middleware
Fog computing
IoT
Internet of Things
Internet of Thing stack models
fog-based Internet of Things
Fog Computing and Security
Fog based IoT
edge computing
computer network security
computer architecture
Cloud-based IoT
Cloud Computing
security
biblio
Adoption of Lamport signature scheme to implement digital signatures in IoT
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
embedded systems
Lamport signature scheme
Internet of Things technology
digital communication
quantum computing
Public key
digital signatures
Generators
firmware
computer network security
authentication
Companies
pubcrawl
Resiliency
IoT devices
Internet of Things
Cryptography
Scalability
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Area Constraint Aware Physical Unclonable Function for Intelligence Module
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
Hardware
Table lookup
security of IoT device
security countermeasures
PUF performance evaluation
pubcrawl
physical unclonable functions
Physical Unclonable Function
NN
Neurons
neural network
IoT devices
intelligence module
Hardware Security
area constraint aware physical unclonable function
Hamming distance
field programmable gate arrays
edge computing
Cryptography
computational intelligence
Compositionality
composability
circuit area
authentication techniques
authentication
Artificial Neural Networks
artificial intelligence technology
area constraint aware PUF
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »