Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
sensor measurements
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
power engineering computing
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
digital devices
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
actuator security
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
biblio
Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
human computer interaction
word recognition procedure
ubiquitous computing
smartphone sensing
smartphone microphone
smart phones
sensors
Semantics
semantic features
Resiliency
pubcrawl
microphones
keystroke sensing
Keyboards
human computer operation recognition
human computer operation
acoustic features
Human behavior
Games
fingerprint identification techniques
fingerprint identification
Feature fusion
feature extraction
determined keystrokes
Context-aware services
computer keyboard
composability
classification model
Activity Recognition
Acoustics
Acoustic Fingerprints
biblio
Propagation Characteristics of Acoustic Emission Signals in Multi Coupling Interface of the Engine
Submitted by grigby1 on Wed, 01/16/2019 - 2:28pm
pubcrawl
Human behavior
Resiliency
Scalability
sensors
acoustic coupling
Blades
Engines
acoustic emission
attenuation
attenuation coefficient
Circuit faults
engine
fault diagnosis
propagation characteristics
Rotors
biblio
Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
pubcrawl
wireless sensor networks
wireless mesh networks
Wireless communication
Traffic flow
telecommunication security
single-layer defenses
sensors
Routing protocols
Routing
route manipulation attack
resilience
cognitive radio
off-sensing and route manipulation attack
Metrics
Knowledge engineering
individual network layers
FCC
cross-layer routing protocols
cross-layer attack
cross-layer assault
CR-based wireless mesh networks
composability
cognitive radio based wireless mesh networks
biblio
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
Internet of battlefield things
wireless networks
war scenarios
telecommunication security
sensors
Scalability
Resiliency
resilience
pubcrawl
Poisson point process
mission-critical data
military communication
iobt
Internet of Things
Ad hoc networks
information dissemination
Human Factors
Geometry
Epidemics
Decision Making
critical information dissemination
coordinated decision-making
Computational modeling
combat efficiency
Biological system modeling
Battlefield
Analytical models
biblio
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices
Submitted by grigby1 on Mon, 12/10/2018 - 11:30am
pubcrawl
composability
sensors
trustworthiness
Mobile and IoT devices
operating systems
security and privacy
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Asymptotic Analysis of a New Low Complexity Encryption Approach for the Internet of Things, Smart Cities and Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
sensors
party fusion center perspectives
probability
pubcrawl
quantisation (signal)
quantizer
resilience
Resiliency
scalar parameters
secure estimation
sensor networks
sensor outputs
parameter estimation
smart cities
Smart Grid
Smart Grid Sensors
stochastic encryption
telecommunication security
TPFC estimation
vector parameter estimation
wireless medium
wireless sensor networks
WSN
Internet of Things
binary stochastic encryption approach
Compositionality
Cryptography
encrypted nonbinary quantized data
encryption
encryption approaches
fixed threshold binary quantization limits parameter estimation
Human behavior
Human Factors
information security
asymptotic analysis
legitimate fusion center
LFC estimation
low complexity encryption
low complexity encryption approach
maximum likelihood estimation
maximum-likelihood estimation
mean square error methods
nonbinary generalized case
nonbinary quantized observations
optimal estimators
biblio
Context-Based Security and Privacy for Healthcare IoT
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
patient-centric information
Human Factors
information collection
information sharing
Internet of Things
large scale connectivity
medical devices
medical information systems
Medical services
nursing staff
HIoT
physicians
privacy
pubcrawl
Real-time monitoring
regulatory compliance
Scalability
security
sensors
timely treatment
data privacy
Access controls
actuators
authorisation
Big Data
clinical staff
Context
context-based privacy
context-based security
context-sensitive role-based access control scheme
Access Control
expert systems
health care
health status
healthcare industry
healthcare innovation
healthcare Internet of things
healthcare IoT
healthcare knowledge
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »