Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Physical Layer Continuous Authentication for Wireless Mesh Networks: An Experimental Study
Submitted by grigby1 on Fri, 12/02/2022 - 11:15am
pubcrawl
Metrics
resilience
Resiliency
authentication
Wireless communication
composability
Physical layer
wireless mesh networks
programmable logic arrays
Scattering
Mesh networks
biblio
Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of Things
Submitted by aekwall on Thu, 12/01/2022 - 4:37pm
Measurement
security
Predictive models
authentication
pubcrawl
Resiliency
machine learning
Random access memory
Physical Unclonable Function
Resilient
Constrained Devices
Germanium
Mc-PUF
modeling attack
Resilient Security Architectures
biblio
A Method of Industrial Internet Entity Mutual Trust Combining PKI and IBE Technology System
Submitted by aekwall on Thu, 12/01/2022 - 4:30pm
Industries
PKI Trust Models
trust chain
industrial internet
Production
certification
Memory
pubcrawl
component
collaboration
blockchain
Human behavior
Resiliency
Metrics
Scalability
authentication
internet
Data models
biblio
Wi-SUN Device Authentication using Physical Layer Fingerprint
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
frequency shift keying
Wi-SUN
Resiliency
pubcrawl
physical layer security
physical layer fingerprint
Physical layer
Metrics
IoT
authentication
frequency estimation
Focusing
Fingerprint recognition
feature extraction
device authentication
composabiloity
composability
biblio
A blockchain-based V2X communication system
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
Organizations
ethereum
Telecommunications
RSU
Cooperative Intelligent Transport System (C-ITS)
Distributed Public Keystore (DPK)
ETSI
PKI/CA
Vehicle-to-Everything (V2X)
PKI Trust Models
signal processing
Europe
blockchain
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Scalability
authentication
Public key
biblio
Towards A Distributed Ledger Based Verifiable Trusted Protocol For VANET
Submitted by grigby1 on Tue, 11/22/2022 - 5:30pm
Protocols
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Safety
Scalability
authentication
PKI Trust Models
VANET
blockchain
Trust management
distributed ledger
road side unit
handwriting recognition
public verification
trust management model
biblio
Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta
Submitted by grigby1 on Fri, 11/18/2022 - 2:49pm
Cryptography
evil twin attack
Security by Default
WLAN
Informatics
Penetration Testing
Wireless fidelity
vulnerability assessment
Firewalls (computing)
Servers
authentication
Scalability
security
Software
Resiliency
resilience
pubcrawl
biblio
Evaluation of Performance for Big Data Security Using Advanced Cryptography Policy
Submitted by grigby1 on Fri, 11/18/2022 - 2:17pm
statistical analysis
Retail and Supply Chain
Privacy Preservation Technique
e-commerce
Advanced Cryptography Policy-ACP
Remote authentication
supply chain management
Data Security
Security Policies Analysis
pubcrawl
supply chains
Data Analytics
data analysis
data privacy
privacy
authentication
collaboration
policy-based governance
biblio
Research on Cloud End-User Behavior Trust Evaluation Model Based on Sliding Window
Submitted by grigby1 on Thu, 10/20/2022 - 3:16pm
computer science
trust evaluation model
cloud terminal
Optics
Resiliency
sliding window
Windows Operating System Security
Windows
User behavior
Cloud Computing
composability
Computational modeling
authentication
Conferences
resilience
Metrics
pubcrawl
biblio
PUF-based IoT Device Authentication Scheme on IoT Open Platform
Submitted by aekwall on Fri, 09/30/2022 - 2:46pm
Human behavior
OCF Iotivity
device authentication
PUF
Physical Unclonable Function
information and communication technology
IoT security
standards
composability
security
Resiliency
Metrics
pubcrawl
Computer crime
authentication
Internet of Things
IoT
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »