Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
An Integrated WSAN and SCADA System for Monitoring a Critical Infrastructure
Submitted by BrandonB on Thu, 04/30/2015 - 11:07am
power system measurement
wireless sensor networks
wireless sensor and actuator networks (WSAN)
wireless sensor and actuator networks
Web-based SCADA
web services
surveillance
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA) systems
Substations
security
SCADA systems
SCADA system
remote monitoring
Protocols
actuators
power grids
power engineering computing
multihop WSAN
Monitoring
Logic gates
internet
integrated WSAN
gateway
electrical power grid
critical infrastructures
critical infrastructure monitoring
Critical infrastructure (CI) monitoring
control engineering computing
CI
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 10:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Wed, 04/29/2015 - 9:47am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Mobile Security
Web browser
survey
Smartphones
smart phones
security of data
security
operating systems
nuts
bolts
mobile network security
mobile devices
mobile computing
Mobile communication
Internet society
internet
Computers
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity
biblio
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
malicious code
Training
security precaution
Safety
prudent science
prudent practice
malware experiment design
malware dataset
malware
Communities
invasive software
internet
Guidelines
experiments
dynamic analysis
detection model
datasets
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security
file
Learned Helplessness
Submitted by Sara Kiesler on Thu, 05/29/2014 - 12:01pm. Contributor:
Sara Kiesler
CFP Submissions
internet
user
privacy
anonymity
Carnegie Mellon
HCII
Cyber2025
2014
CFPs
Academia
Position Paper
Publications
file
Big Control in the Industrial Internet
Submitted by beckmann on Thu, 02/20/2014 - 11:06am. Contributor:
Benjamin Beckmann
CPS Domains
Automotive
Avionics
Control
Critical Infrastructure
Transportation
CPS Technologies
Foundations
industrial
internet
CFP Submissions
CFP Paper Submissions
2014 National Workshop on Transportation CPS
2014
Industry
Position Paper
Publications
file
Big Control in the Industrial Internet
Submitted by beckmann on Mon, 02/17/2014 - 3:43pm. Contributor:
Benjamin Beckmann
CPS Domains
Control
Energy
Critical Infrastructure
CPS Technologies
Foundations
industrial
internet
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Industry
Position Paper
Publications
« first
‹ previous
…
88
89
90
91
92
93
94
95
96
next ›
last »