Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT technology
biblio
Analysis of Efficient Network Security using Machine Learning in Convolutional Neural Network Methods
Submitted by grigby1 on Fri, 12/09/2022 - 4:56pm
encryption
machine learning
Organizations
pubcrawl
Human behavior
Metrics
Resiliency
network security
Instruments
composability
resilience
learning (artificial intelligence)
artificial intelligence security
education
IoT technology
security methods
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
biblio
Trustworthy Management in Decentralized IoT Application using Blockchain
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
IoT system
Trustworthy Systems
trustworthy management
Trust management
trust issue
supply chain system
Smart City
smart car
security
Resiliency
pubcrawl
privacy issues
privacy
IoT technology
associated users
IoT
Internet of Things
human living standard
ethereum
decentralized IoT application
data privacy
data modification
cyber physical systems
current centralized system
composability
blockchain technology
Blockchain implementation
blockchain
biblio
A Novel Intrusion Detection Method for Internet of Things
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
intrusion attacks
security of data
optimal network structure
Neurons
network intrusion detection
Metrics
IoT technology
IoT system
IoT networks
Intrusion Detection Systems
intrusion detection model
intrusion detection method
Intrusion Detection
belief networks
Internet of Things era
Internet of Things
genetic algorithms
Embedded System
deep learning
Deep Belief Network
DBN
Biological cells
Artificial Neural Networks
Resiliency
composability
pubcrawl
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance