Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement
Submitted by aekwall on Mon, 11/11/2019 - 11:48am
IoT privacy policy agreement
test equipment
test bed
smart phones
smart phone
security of data
security
Scalability
pubcrawl
privacy policy agreement
Privacy Policies
privacy
policy test bed
mobile computing
Cloud Computing
IoT privacy policy
IoT policy
IoT manufacturers
IoT devices
Internet of Things devices
Internet of Things
Informatics
Human behavior
GDPR
data privacy
computer science
Compliance
biblio
IoTSM: An End-to-End Security Model for IoT Ecosystems
Submitted by grigby1 on Wed, 10/30/2019 - 10:30am
security
IoTSM
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
Science of Security
secure development
IoT security model
security model
security of data
Security Practices
Software
software assurance
software assurance maturity model framework
telecommunication security
Internet of Things
Companies
comparability
composability
Ecosystems
end-to-end IoT security
end-to-end security
end-to-end security model
Human behavior
collaboration
Interviews
IoT
IoT devices
IoT ecosystems
IoT organizations
IoT practitioners
IoT security
biblio
IoT Enabled Robots with QR Code Based Localization
Submitted by aekwall on Mon, 09/23/2019 - 10:47am
sensor data
Protocols
pubcrawl
QR code
QR code detection
QR code landmark recognition
QR codes
Resiliency
Robot sensing systems
Path Planning
Servers
Service robots
shortest path computation
smart devices
SSHv2 protocol
wireless LAN
wireless local area network
Artificial Intelligence
Path optimization
mobile robots
IoT enabled robots
IoT devices
Internet of Things
indoor navigation
indoor localization
heading measurements
Floors
Floor Mapping
encrypted communication channel
Dijkstras algorithm
cyber physical systems
Cryptography
control engineering computing
biblio
Security Weaknesses and Attacks on the Internet of Things Applications
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
privacy
wireless sensor networks
Smart homes
Smart Home
smart farm
smart car
smart campus
security weaknesses
security of data
security
resilience
pubcrawl
Protocols
Data collection
policy-based governance
objects information
Metrics
IoT environment
IoT devices
IoT attacks
IoT applications
Internet of Things applications
Internet of Things
internet
Human behavior
Healthcare
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
biblio
Deploying Robust Security in Internet of Things
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
risk management
worst-case security risks
uncertainty
Stochastic processes
stochastic model
Stochastic computing
security risk
security offloading
security of data
security incidents
security
Scalability
Robustness
robust security
risk measurement
Cloud Computing
resource-constrained nature
Resiliency
pubcrawl
optimal robust deployment
offloaded security mechanisms
IoT system
IoT security
IoT devices
Internet-of-Things
Internet of Things
expected case security risks
conditional value-at-risk
Communication networks
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart contracts
Metrics
network accountability
open systems
Peer-to-peer computing
permissioned blockchain
Provenance
pubcrawl
resilience
Resiliency
IoT devices
Stakeholders
Trusted Computing
trustworthy orchestration
Trustworthy Systems
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
context dependent data analysis
blockchain
blockchain container based architecture
business network
Cloud Computing
cloud resources
composability
computer architecture
container based edge computing
Containers
accountability
cyber physical systems
data analysis
decentralized interaction model
EC infrastructures
edge computing
Internet of Things
Internet of Things devices
IoT based applications
biblio
A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
message authentication
telecommunication security
Servers
security mechanisms
robust anonymity preserving authentication protocol
Resiliency
resilience
radiofrequency identification
public key cryptography
pubcrawl
Protocols
privacy
online threat
Metrics
anonymity
lightweight authentication
IoT devices
Internet of Things
Human Factors
Human behavior
Generators
efficient public key cryptography mechanism
ECC
data privacy
Cryptographic Protocols
composability
authentication
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »