Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Thing
biblio
Internet of Things Security and Forensics: Concern and Challenges for Inspecting Cyber Attacks
Submitted by grigby1 on Fri, 06/09/2023 - 1:16pm
Forensics
IoT Forensics
policy governance
Human Factors
Internet of Thing
Cyber Attacks
Intelligent systems
education
cybersecurity education
supply chains
IoT security
Internet of Things
resilience
manufacturing
composability
Ecosystems
Scalability
Resiliency
Human behavior
pubcrawl
cyber security
biblio
Adaptive Neuro-fuzzy System (ANFIS) of Information Interaction in Industrial Internet of Things Networks Taking into Account Load Balancing
Submitted by grigby1 on Fri, 09/16/2022 - 3:46pm
Inference algorithms
information interaction
Internet of Thing
Resiliency
Fuzzy logic
Wireless Sensor Network
Sensor Systems
Clustering algorithms
neural network
adaptive systems
Load management
load balancing
wireless sensor networks
resilience
Metrics
pubcrawl
security
biblio
Multi-Core Parallel Processing Technique to Prepare the Time Series Data for the Early Detection of DDoS Flooding Attacks
Submitted by grigby1 on Tue, 02/22/2022 - 12:42pm
pubcrawl
Cloud Computing
Internet of Things
multicore computing security
Internet of Thing
distributed denial of service attacks
denial-of-service attack
Distributed databases
parallel processing
Time series analysis
Floods
Scalability
Resiliency
resilience
Metrics
biblio
Deep Learning-Based Intrusion Detection for IoT Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
pubcrawl
IoT devices
IoT network
learning (artificial intelligence)
multiclass classification
Network reconnaissance
packet level
pattern classification
Power Grid
IoT dataset
reconnaissance attacks
resilience
Resiliency
Scalability
security controls
telecommunication traffic
Traffic flow
feed-forward neural networks model
communication infrastructure
computer network security
computing infrastructure
deep learning-based intrusion detection
defence networks
Denial of Service attacks
distributed denial of service
Feed Forward Neural Networks
binary classification
feedforward neural nets
field information
healthcare automation
information theft attacks
Internet of Thing
Internet of Things
Intrusion Detection
biblio
How Blockchains Can Help Legal Metrology
Submitted by grigby1 on Wed, 05/30/2018 - 3:08pm
blockchain
Human Factors
Internet of Thing
legal metrology
measuring instruments
privacy
pubcrawl
smart grid consumer privacy
Smart Grids
software inspection
biblio
Secure Transmission Protocol for the IoT
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
Compositionality
information security
Internet of Thing
Policy
policy-based collaboration
privacy
protocol verification
pubcrawl
transmission protocol
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography