Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MQTT
biblio
Systematic review on mitigating and preventing DDoS attacks on IoT networks
Submitted by grigby1 on Thu, 06/22/2023 - 2:09pm
Proposals
Prevention
DDoS Attack Prevention
Resiliency
mitigation
denial-of-service attack
MQTT
CoAP
Systematics
Compositionality
Internet of Things
DDoS Attacks
composability
Computer crime
Protocols
resilience
Metrics
pubcrawl
IoT
security
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers
Submitted by grigby1 on Fri, 01/06/2023 - 4:05pm
Internet of Things
IoT
pubcrawl
Human behavior
Metrics
resilience
Resiliency
performance evaluation
composability
fuzzing
Transportation
Air gaps
MQTT
denial-of-service attack
ethics
data transfer
biblio
Security and Performance Analysis of MQTT Protocol with TLS in IoT Networks
Submitted by grigby1 on Fri, 11/18/2022 - 2:48pm
IoT
pubcrawl
resilience
Resiliency
Hardware
performance evaluation
Scalability
Protocols
Performance analysis
Power demand
microcontrollers
MQTT
TLS
Security analysis
Security by Default
transport protocols
biblio
Learning-Based Fuzzing of IoT Message Brokers
Submitted by grigby1 on Fri, 02/25/2022 - 1:35pm
Software algorithms
stateful fuzzing
model inference
conformance testing
active automata learning
learning automata
MQTT
middleware security
Software systems
security
fuzzing
Manuals
composability
Protocols
collaboration
policy-based governance
pubcrawl
IoT
biblio
Development and Implementation of a Relay Switch Based on WiFi Technology
Submitted by grigby1 on Wed, 08/11/2021 - 12:01pm
Wireless communication
iOS Security
WiFi Technology
Embedded System
Microprogramming
MQTT
Relays
Wireless fidelity
composability
Internet of Things
Hardware
Software
Resiliency
resilience
Metrics
Human Factors
pubcrawl
IoT
biblio
Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key infrastructure and ISO/IEC 20922
Submitted by aekwall on Thu, 06/24/2021 - 11:54am
Protocols
Resiliency
pubcrawl
composability
internet
Automated Response Actions
IEC standards
Cyber-security
MQTT
Voltage control
Load management
frequency control
ISO standards
ADR
Automated Demand Response
biblio
Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
Metrics
XMPP IoT communication protocols
XMPP
transport protocols
Software
security
Resiliency
resilience
pubcrawl
Protocols
protocol
Power demand
popular IoT protocols
MQTT
advantage
IoT protocol
IoT
Internet of Things
HTTP
hardware stage
Hardware
Esp32
embedded systems
Embedded System
different IoT protocols
composability
CoAP
biblio
Remote Access Control Model for MQTT Protocol
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
access control model
data deletion
TLS protocol
third-party services
remote access control model
OAuth protocol
Internet of Things security problems
device discretionary access control model
data transferring
access privileges
access matrix
security
secure access control
MQTT protocol
MQTT
privacy
pubcrawl
Cryptographic Protocols
Internet of Things
authorisation
Scalability
computer network security
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
Attack detection
trust value security
time 0.5518318 s
PHP database
On-offAttack
on-off attack
Object
MySQL database
trustworthiness management
IoT object security
MQTT
security of data
Topology
trustworthiness
network topology
authentication
SQL
Databases
composability
pubcrawl
Internet of Things
Servers
1
2
next ›
last »