Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT device
biblio
Analysis of the Optimized KNN Algorithm for the Data Security of DR Service
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
Compositionality
smart energy
IoT device
supply and demand
Costs
system integration
Memory
supervised learning
Internet-scale Computing Security
demand response
denial-of-service attack
KNN
Cloud Computing
composability
information security
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
IoT Enhancement with Automated Device Identification for Network Security
Submitted by grigby1 on Tue, 02/28/2023 - 5:51pm
Fingerprint recognition
Weak
Powerless system
IP Connection
Firmware Equipment
Automated Device
Distance measurement
IoT device
law enforcement
IoT network security
Market research
Internet of Things
composability
Object recognition
IoT security
network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Risk Management of Fog Computing for Improving IoT Security
Submitted by grigby1 on Fri, 11/18/2022 - 2:08pm
Resiliency
Security Risk Management
Risk Matrix
Risk Breakdown Structure
Electric breakdown
IoT device
Fog computing
delays
Protocols
Scalability
Internet of Things
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
risk management
Cloud Computing
biblio
Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
Metrics
Somewhat Homomorphic Encryption
Human Factors
fully homomorphic encryption
Home appliances
Homomorphic encryption
statistical analysis
smartphone
public key cryptography
pubcrawl
Portable computers
Computers
Scalability
IoT device
performance evaluation
Conferences
Resiliency
resilience
biblio
Secure IoT Device Authentication Scheme using Key Hiding Technology
Submitted by grigby1 on Thu, 08/12/2021 - 4:23pm
Metrics
WBC
software reliability
Software
security
Resiliency
resilience
PUF
pubcrawl
authentication
Market research
IoT security
IoT device
information and communication technology
Human behavior
Hardware
device authentication
composability
biblio
The Role of Combinatorial Mathematical Optimization and Heuristics to improve Small Farmers to Veterinarian access and to create a Sustainable Food Future for the World
Submitted by aekwall on Tue, 04/27/2021 - 1:34pm
Agriculture
Z3
Solvers
Pyomo
mathematical formulation
IoT device
Hanumayamma
GLPK
edge
CPLEX
Cow Necklace
CBC
Scalability
predictability
Security Heuristics
Linear programming
Artificial Intelligence
Unified modeling language
Mathematical model
optimization
pubcrawl
Resiliency
security
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
1
2
3
next ›
last »