Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT network
biblio
IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
LLN
Worst parent selection
System performance
simulation
RPL network
Routing protocols
routing attacks
Routing
performance evaluation
Of0)
Ob-jective Function (MRHOF
6LoWPAN
Linear programming
IoT network
Intrusion Detection
IDS
Contiki-Cooja
pubcrawl
composability
resilience
Resiliency
biblio
Malicious Attack and Intrusion Prevention in IoT Network using Blockchain based Security Analysis
Submitted by aekwall on Tue, 06/01/2021 - 1:23pm
Block Chain
blockchain
composability
Compositionality
computational intelligence
Cryptography
information security
Internet of Things
Intrusion Detection
IoT network
privacy
pubcrawl
security
Security Malicious Attack
smart cities
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
Internet of Things
Security Metrics
security functions
security as a service
pubcrawl
placement optimization
Metrics
IoT security solutions
IoT security framework
IoT network
IoT
Centrality
graph theory
EndToEnd like encryption
edge computing security
edge computing
dominating set
Cryptography
Computing Theory
computer network security
centrality metrics
biblio
Deep Learning-Based Intrusion Detection for IoT Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
pubcrawl
IoT devices
IoT network
learning (artificial intelligence)
multiclass classification
Network reconnaissance
packet level
pattern classification
Power Grid
IoT dataset
reconnaissance attacks
resilience
Resiliency
Scalability
security controls
telecommunication traffic
Traffic flow
feed-forward neural networks model
communication infrastructure
computer network security
computing infrastructure
deep learning-based intrusion detection
defence networks
Denial of Service attacks
distributed denial of service
Feed Forward Neural Networks
binary classification
feedforward neural nets
field information
healthcare automation
information theft attacks
Internet of Thing
Internet of Things
Intrusion Detection
biblio
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
software-defined networking
Service efficiency problems
routing security policy verification
interconnected devices
security policy
security policies
IoT network
quality of service
delays
network traffic
Monitoring
telecommunication network routing
Routing
policy-based governance
pubcrawl
security
Runtime
telecommunication security
Internet of Things
telecommunication traffic
biblio
Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
routing protocol for low power and lossy network
trustworthy nodes
trust-based enhanced secure RPL routing attacks
trust value
Trust Routing
trust evaluation methods
sybil attacks
Sybil attack
standardized proactive routing protocol
security
Secure DODAG Construction
Sec-Trust protocol
Scalability
RPL security
Routing protocols
composability
Routing
resource constrained characteristics
rank attack
pubcrawl
providing routing security using the technique of collective trust mechanism
PROTECT
performance evaluation
IoT network
IoT
Internet of Things
forwarding data packets
energy consumption
computer network security
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
Metrics
Zigbee
WSN security
wireless sensor networks
wireless security
wireless communication devices
Wireless communication
telecommunication security
sensor security
Resiliency
pubcrawl
poor wireless communication
performance evaluation
mutual authentication
authentication
low-performance sensors
low performance communication ability
lightweight mutual authentication
key agreement
IoT security
IoT network
Internet of Things
Human behavior
high-quality communication
Cryptographic Protocols
composability
communication functions
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges