Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
security
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
low power consumption
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
ARM hardware virtualization technique
kernel-level memory data
kernel privilege
kernel level attack
Kernel
IoT devices
Internet of Things
hypervisor privilege
Human behavior
Hardware
hardened memory data protection framework
H-Securebox system
embedded systems
data privacy
composability
ARM Hypervisor
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Internet of Things: Raging Devices and Standardization in Low-Powered Protocols
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
low-powered protocols
Thread
The Thing
standardization
standard communication protocols
sensors
security
Resiliency
resilience
raging devices
pubcrawl
Protocols
OSI model
OSI
open systems
6LoWPAN
IP networks
IoT system architecture
IoT devices
IoT
Internet of Things
internet
IEEE 802.15.4
IEEE 802.15 Standard
data centers
Cyber Physical Systems Security
computer centres
composability
CoAP
Capacity planning
biblio
Designing a Micro-moving Target IPv6 Defense for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
Metrics
testing
sensors
Resiliency
Reconnaissance
pubcrawl
Protocols
optimization
moving target defense
micromoving target IPv6 defense
Cooja simulation configuration
Limiting
IP networks
IoT devices
IoT
Internet of Things
internet
hardware testing
embedded systems
cyber security
biblio
FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
wireless sensor networks
sensor security
sensor networks
sensor network integration
network servers
IoT gateway
IoT devices
internetworking
information centric networking
ICN
heterogeneous sensor networks
FOGG
fog computing based gateway
Fog computing
edge computing
security
Logic gates
IP networks
internet
Cloud Computing
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Security and privacy on internet of things
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT protocol
wireless sensor networks
telecommunication security
sensors
security of data
security
Resiliency
pubcrawl
Protocols
privacy
Metrics
IoT security
attacks
IoT privacy
IoT devices
Internet of Things (IoT)
Internet of Things
internet
Human Factors
Human behavior
data privacy
computer architecture
composability
biblio
A novel approximate computing based security primitive for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT devices
Watermarking
ultra-low power design requirement
Three-dimensional displays
telecommunication security
telecommunication power management
security primitive
Resiliency
pubcrawl
Metrics
Lightweight Encryption
IoT security
approximate computing
Internet of Things
Internet infrastructure
information hiding approach
Human Factors
Human behavior
hardware security vulnerabilities
Fingerprinting
digital watermarking
device authentication
Cryptography
composability
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »