Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
"An Architecture for Fully Reconfigurable Plug-and-Play Wireless Sensor Network Testbed"
Submitted by grigby1 on Tue, 02/21/2017 - 11:59am
Ad hoc networks
dual-stack Contiki OS
Monitoring
multihop network
nonstandardized clean-slate protocol stack
Protocols
ProtoStack tool
pubcrawl170103
reconfigurable plug-and-play wireless sensor network testbed
RESTful API
sensors
standard protocol stack
tuning
Wireless communication
wireless sensor networks
biblio
"Scalable Security Event Aggregation for Situation Analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:43pm
scalable security event aggregation
large-scale data processing
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170101
query languages
query support
large-scale data analysis
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
big-data security analytics
advanced persistent threats
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
advanced persistent threat
Computer crime
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
identity management mechanisms
authentication
authorisation
authorization
communication protocols
Companies
data privacy
identifier
Identities of Things discussion group
identity
sensors
internet
Internet of Things
IoT
Kantara Initiative
name service
Object recognition
privacy
Protocols
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Wed, 05/06/2015 - 10:40am
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
Multiagent Web for the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 9:55am
language independent data formats
Web-scale multiagent Internet of Things
Web protocols
transport protocols
sensors
security
Protocols
network of networks
multiagent Web
multiagent architecture
multi-agent systems
Cloud Computing
JSON
Internet of Things
internet
HTTP
heterogeneous platforms
electronic data interchange
Databases
data management architecture
computer architecture
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm
Submitted by BrandonB on Tue, 05/05/2015 - 12:28pm
Agent Based Paradigm
agents paradigm
Analytical models
business continuity
computer security
cybersecurity risk management
Educational institutions
Informatics
proactive behavior
risk management
SA
security management systems
security of data
sensors
situational awareness
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »