Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT system
biblio
Deploying Robust Security in Internet of Things
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
risk management
worst-case security risks
uncertainty
Stochastic processes
stochastic model
Stochastic computing
security risk
security offloading
security of data
security incidents
security
Scalability
Robustness
robust security
risk measurement
Cloud Computing
resource-constrained nature
Resiliency
pubcrawl
optimal robust deployment
offloaded security mechanisms
IoT system
IoT security
IoT devices
Internet-of-Things
Internet of Things
expected case security risks
conditional value-at-risk
Communication networks
biblio
Mechanisms for Meaningful Consent in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
Internet of Things
transparency
Scalability
pubcrawl
privacy protection
privacy
meaningful consent
IoT system
Internet of Things (IoT)
apparency
Human Factors
expert systems
data privacy
data management
data activities
data actions
computer network security
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
Study of secure boot with a FPGA-based IoT device
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
bitstream decoding
network on chip security
Xilinx Zynq-7000 Series System-on-Chip ZC706 prototype board
Trojan Horse attacks
software-based security implementation
Secure Boot
IoT system
infrastructure components
host processor computation power
FPGA-based IoT device
FPGA design
FPGA bitstream
encrypt system boot image
effective security provisioning
critical components
pubcrawl
system-on-chip
Decoding
Metrics
resilience
system security
field programmable gate arrays
Trojan horses
authentication
encryption
Cryptography
Internet of Things
Scalability
Resiliency
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
« first
‹ previous
1
2