Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed architecture
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
remote patient monitoring
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
medical information systems
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
health care
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
blockchain
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
biblio
An architecture model for smart city using Cognitive Internet of Things (CIoT)
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
smart cities
MEMS
Protocols
pubcrawl
radio frequency identification
resilience
Resiliency
RFID
RFIDs
Servers
massive volume
Smart City
smart devices
smart features
social aspects of automation
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
Data integration
central server
centralized server
CIoT
cognitive Internet of Things
cognitive radio
communication protocol
data analysis
Data collection
architecture model
Data processing
distributed architecture
heatmap
Human behavior
human factor
Internet of Things
IoT
IoT data
biblio
SVED: Scanning, Vulnerabilities, Exploits and Detection
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
vulnerabilities
threat intelligence information
SVED
Software
Sensor Systems
security of data
scanning
Resiliency
pubcrawl
Compositionality
malicious actions
Intrusion Detection Systems
Intelligent sensors
Human Factors
Human behavior
exploits and detection tool
distributed architecture
Databases
cyber security experiments
computer security