Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
memory requirements
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
Hunting for Naval Mines with Deep Neural Networks
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
sonar imaging
modest DNN model
naval engineering computing
neural nets
privacy
pubcrawl
remotely operated vehicles
robot vision
sea faring vessels
side-scan sonar imagery
Sonar
minelike objects
support vector machine
Support vector machines
threat vectors
Throughput
trainable parameter count
Training
Training data
Underwater vehicles
visualization technique
Weapons
DNN depth
autonomous unmanned underwater vehicle
Brain modeling
calculation requirements
computation requirements
Computational modeling
data distribution training
Data models
deep neural network methods
deep neural networks
detection efficacy
autonomous underwater vehicles
DNN models
explosive naval mines
explosives
feature extraction
image recognition
image recognition tasks
learning (artificial intelligence)
memory requirements
Metrics
biblio
Secure authentication on the Internet of Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
lightweight cryptographic algorithms
user credential protection
universal access
Servers
resource constrained environments
Resiliency
resilience
pubcrawl
Protocols
Phishing
mutual multifactor authentication
multifactor authentication
Metrics
memory requirements
man-in-the-middle attacks
authentication
Internet of Things
Human Factors
human factor
Human behavior
Cryptography
Cryptographic Protocols
confidential communications
Computer crime
code size
Ciphers
biometrics (access control)
biometrics
biometric-based cryptographic techniques
biometric authenticated key exchange protocol