Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart Sensor
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 2:21pm
Indexes
wireless access points
vulnerabilities
Smart Sensor
Smart Grid Sensors
Smart Grid
smart cities
Servers
Sensor Systems
security of data
Resiliency
pubcrawl
process algorithm
physical object
local real-time control activities
Intelligent sensors
Cloud Computing
Humidity
Human Factors
Human behavior
enterprise command
Data collection
cyber-physical systems
cyber security threats
cyber security
cyber physical sensors system security
cyber physical SENSOR Systems
Cryptography
CPSS threats
control center
computing platform
composability
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data