Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security services
biblio
Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach
Submitted by aekwall on Fri, 02/25/2022 - 9:45am
Provenance
Senior citizens
security services
security risks
security evidence
security
Resiliency
Regulation
real-time systems
pubcrawl
Security Risk Estimation
Protocols
Metrics
Internet of Things-Health
Insurance
Human behavior
estimation
data propagation
composability
Compliance
biblio
Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT
Submitted by aekwall on Mon, 06/28/2021 - 11:37am
orchestration
wireless sensor networks
tools
security services
Scalability
Resiliency
pubcrawl
performance evaluation
Performance
Fog computing
IoT
IDPS
fog nodes
Fog Computing and Security
edge computing
Containers
computer architecture
security
biblio
A HES for Low Speed Processors
Submitted by grigby1 on Thu, 05/20/2021 - 10:55am
Program processors
white box cryptography
HES
DES
decryption
security services
Robustness
Task Analysis
Memory management
Ciphers
composability
standards
security mechanisms
Resiliency
resilience
Metrics
pubcrawl
encryption
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
biblio
Security challenges for Water Distribution System Using Supervisory Control and Data Acquisition (SCADA)
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
pubcrawl
water distribution system security
water distribution system
security services
security of data
SCADA Systems Security
SCADA systems
SCADA networks
Resiliency
public utilities
autonomous SCADA systems
Intrusion access control
Human behavior
elastic search
distribution systems
distributed supervisory control and data acquisitions
data modelling
data acquisition
Cyber Attacks
Compositionality
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
1
2
next ›
last »