Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Industrial IoT
biblio
Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT
Submitted by aekwall on Fri, 03/03/2023 - 10:51am
certification
key management
Industrial IoT
Improved PKI
centralized device management
Costs
Industrial Internet of Things
Production facilities
blockchains
Servers
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Public key
network security
biblio
Enhancing Security in the Industrial IoT Sector using Quantum Computing
Submitted by grigby1 on Thu, 07/14/2022 - 3:41pm
computer architecture
Cloud Computing
pubcrawl
Generators
Scalability
Cryptography
Industrial IoT
Industries
quantum computing
Internet of Things
IBM Quantum
cyber physical systems
random number generators
fourth industrial revolution
QRNG
quantum computing security
biblio
Edge Data Security for RFID-Based Devices
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
radio-frequency identification (RFID)
Wideband
Transmission attack
security
Robot sensing systems
RFIDs
RFID tags
Resiliency
resilience
Denial of Service (DoS) Attack
Radio frequency identification (RFID)
radio frequency identification
pubcrawl
Monitoring
integrated circuits
Industrial IoT
Human behavior
encoding
biblio
Blockchain for Increased Cyber-Resiliency of Industrial Edge Environments
Submitted by grigby1 on Thu, 09/16/2021 - 11:51am
blockchain
Consensus algorithm
Cyber-resiliency
distributed ledger
edge computing
Hyperledger Fabric
Industrial IoT
network topology
Peer-to-peer computing
pubcrawl
resilience
Resiliency
security
Topology
biblio
Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
Configurability
utility calculation
trustworthy operation
trustworthiness profiles
profile
modular model
modular extensible approach
Industrial IoT
Industrial Internet Security Framework
industrial internet consortium
dynamically evaluable form
dynamic evaluation
dynamic assessment
cross-company Industry
computer network security
behaviour-based context-based
automatically verifiable operations
automatable trust models
regulatory requirements
trustworthiness
production engineering computing
supply chain management
supply chains
Metrics
composability
pubcrawl
Trusted Computing
Internet of Things
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
load balancing technology
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
Fog Radio Access Network
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
delays
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
5G mobile communication
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
biblio
Design patterns for the industrial Internet of Things
Submitted by grigby1 on Mon, 11/02/2020 - 11:41am
Industries
wireless sensor networks
sensors
security
Scalability
pubcrawl
production engineering computing
process optimization
process control
privacy concerns
object-oriented programming
leveraging multiple information sources
Internet of Things
interconnected sensors
Industry 4.0
Cloud Computing
industrial revolution
industrial property
Industrial IoT
Industrial Internet of Things
industrial control system setting
industrial control
iiot
i/o systems security
i-o systems security
Design patterns
data privacy
data flow semantics
cost reduction
biblio
Framework for Handover process using Visible Light Communications in 5G
Submitted by aekwall on Mon, 07/13/2020 - 11:16am
Scalability
mobility and handover
mobility management (mobile radio)
multi-access systems
multiuser access
Optical Wireless Communication
pubcrawl
Radio Frequency spectrum resources
Resiliency
RF spectrum resources
Metrics
smart devices
steerable access point
visible light communication (VLC)
visible light communications
Visual Light Communications Security
Wireless communication
wireless communication technologies
Wireless fidelity
Industrial IoT
bidirectional transmission
digital machines
free-space optical communication
Handover
handover process
iiot
indoor environment
indoor radio
Industrial Internet of Things
5G mobile communication
Internet of Everything
Internet of Things
IoE
Li-Fi concept
light fidelity
light-fidelity
Light-Fidelity (Li-Fi)
mechanical machines
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
1
2
next ›
last »