Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
Analysis of ICMetrics Features/Technology for Wearable Devices IOT Sensors
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
key generation
wearables security
Wearable devices
wearable computers
Sports Activity Data
Software
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
online services
Accelerometers
IOT sensors
IoT
Internet of Things
ICmetrics
ICMetric
Human behavior
Hardware
feature extraction
encryption keys
encryption
Cryptography
authentication
Apple Watch
biblio
Distributed Intrusion Detection Using Mobile Agents in Wireless Body Area Networks
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
security of data
patient monitoring
privacy
pubcrawl
real-time patient monitoring
resilience
Resiliency
Scalability
security
patient data
sensors
telecommunication security
Wearable devices
wearables security
Wireless body area networks
Wireless communication
wireless medical sensors
wireless sensor networks
Human behavior
body area networks
body sensor networks
Communication system security
Data protection
distributed intrusion detection
distributed mobile agent-based intrusion detection system
health care
healthcare systems
autonomous mobile agents
implanted medical devices
learning (artificial intelligence)
local network level anomaly detection
machine learning algorithms
medical healthcare applications
mobile agents
patient care
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
Artificial Neural Network Based IDS
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
nonmalicious communication
UDP flood attack
telecommunication traffic
SYN flood attack
standards
signature based NIDS
sensors
security of data
Resiliency
resilience
pubcrawl
Ports (Computers)
policy-based governance
anomaly based neural network intrusion detection system
NNIDS
nMap scanning attack
neural nets
network intrusion detection systems
Metrics
Intrusion Detection
digital signatures
Databases
Artificial Neural Networks
artificial neural network based IDS
anomaly based NIDS
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Protocols
spectrum sensing information
signal detection
sensors
sensing network
semihonest adversary model
Scalability
Resiliency
resilience
radio transmitters
public-key cryptography
public key cryptography
Public key
pubcrawl
Adversary Models
privacy preserving localization
privacy
Particle measurements
particle filtering (numerical methods)
multiple sensing radios
Metrics
Human behavior
distributed particle filtering protocol
cooperative communication
cognitive radios systems
cognitive radio
Atmospheric measurements
biblio
End-To-End Security Architecture for Federated Cloud and IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
network federation mechanisms
virtualisation
Software Architecture
smart Internet of Things
SFC
service function chaining
sensors
security policy enforcement
security of data
security
Resiliency
resilience
pubcrawl
NFV
network slices protection
network function virtualisation
actuator security
Metrics
IoT networks
Internet of Things
Human behavior
heterogeneous platforms
end-to-end security architecture
Data protection
Data Analytics
data analysis
computer architecture
composability
Communication networks
clouds
cloud networks
Cloud Computing
biblio
Sensor Security Index for Control Systems
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
multiple sensors
system vulnerability
system destruction
Stuxnet
Steady-state
sensors
sensor security index
sensor bias injection attacks
sensor attacks
Sensor attack
security of data
security
Resiliency
resilience
pubcrawl
north eastern electrical grid black out
actuator security
Metrics
malicious attacks
Linear systems
linear dynamic systems
linear control systems
Indexes
Human behavior
Gold
Detectors
Cyber-physical attack
Control systems attack
composability
anomaly detector
actuators
biblio
Dynamic Reconfigurability of Wireless Sensor and Actuator Networks in Aircraft
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
telecommunication traffic
pubcrawl
quality of service
Reliability
resilience
Resiliency
security
sensors
standardization
Metrics
transceivers
wireless networks
wireless sensor
wireless sensor networks
wireless spectrum
wireless terminals
wireless traffic
actuator networks
Human behavior
flexible transceiver hardware
dynamic resource management
dynamic network reconfigurability
dynamic network architecture
dynamic configurability
cross-layer network architectures
composability
cognitive radio
avionics
aircraft communication
Aircraft
Aerospace electronics
actuators
actuator security
biblio
Multicast Security Model for Internet of Things Based on Context Awareness
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
actuator security
actuators
composability
context awareness
Context-aware services
Group key management
Human behavior
Internet of Things
Metrics
Protocols
pubcrawl
resilience
Resiliency
security
sensors
Servers
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »