Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
middleware
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
biblio
A Security-Enhanced Interoperability Middleware for the Internet of Things
Submitted by aekwall on Mon, 03/16/2020 - 9:35am
GHOST
Scalable Security
vendor
security-enhanced interoperability middleware
scalable solution
Safe-Guarding Home IoT Environments
Personalised Real-time Risk Control project
operational requirements
main features
IoT object abstraction layer
Internet of Things middleware
highly resilient solution
hardware platforms
security
generic object model
effective IoT platform
confidentiality
open systems
authorization
home automation
middleware
authentication
pubcrawl
Internet of Things
Scalability
security of data
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 9:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
Information-Centric IoT Middleware Overlay: VSL
Submitted by grigby1 on Tue, 01/21/2020 - 10:27am
Scalability
name-based communication architectures complement
Object oriented modeling
Peer-to-peer computing
physical environments
physical surroundings
pubcrawl
resilience
Resiliency
name-based communication architectures
security-by-design
semantically-rich data item lookup
service-centric
service-centric designs
site-local data-centric architecture
site-local installations
virtual state layer
Information Centric Networks
Context modeling
Data models
data-centric
data-centric Internet architectures
data-centric VSL interface
edge-based installations
explicit data
Information Centric Network
computer architecture
information-centric
information-centric IoT middleware overlay
Internet of Things
Internet weather databases
IoT services
middleware
name-based
biblio
Security Embedded Offloading Requirements for IoT-Fog Paradigm
Submitted by aekwall on Mon, 01/20/2020 - 10:53am
IoT-Fog based systems
Task Offloading
security provision
security embedded task offloading requirements
security embedded offloading requirements
Scalability
resource allocation
Resiliency
pubcrawl
propagation latencies
offloading security
middleware technologies
middleware
Middle-ware
IoT-Fog paradigm
Cloud Computing
IoT-Fog based future communication networks
Internet of Things (IoT)
Internet of Things
internet
information processing
future smart networks
Fog Computing and Security
Fog computing
embedded security requirements
edge computing
delay tolerant networks
Data protection
data management
computer network security
biblio
Fog-Based Internet of Things: A Security Scheme
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
IoT devices
traditional data center
time-sensitive applications
security scheme
Scalability
response time
Resiliency
pubcrawl
Protocols
nearby light-weight middleware
MQTT protocol
MQTT
middleware
Fog computing
IoT
Internet of Things
Internet of Thing stack models
fog-based Internet of Things
Fog Computing and Security
Fog based IoT
edge computing
computer network security
computer architecture
Cloud-based IoT
Cloud Computing
security
biblio
A Middleware Framework to Address Security Issues in Integrated Multisystem Applications
Submitted by aekwall on Mon, 01/13/2020 - 11:18am
open systems
Systems-of-Systems
Systems Integration
smart cities
sensors
security of data
security attacks
security aspects
security
Resiliency
pubcrawl
production engineering computing
Access Control
multisystem integration
middleware
Metrics
manufacturing systems
interoperability
integrated multisystem applications
industrial applications
Human behavior
composability
actuators
actuator security
biblio
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
repetitive operational profile
physical damage
Physical damage control
Physical Threats in IoT
PLC
policy-based governance
programmable controllers
programmable logic controller
pubcrawl
operating devices
Resiliency
response system
SCADA server
SCADA systems
SCADA Systems Security
security
security of data
system monitoring
destructive attacks detection
actuator security
actuators
composability
Compositionality
Computer worms
CPS
cyber-physical system security
cyber-physical systems
actuator
Hardware
Human behavior
IoT security
malicious operation
Metrics
middleware
middleware security
Monitoring
biblio
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
Linux
Servers
Scalability
Resiliency
pubcrawl
peer-to-peer solutions
Peer-to-peer computing
Monte Carlo methods
Mobile handsets
mobile computing
mobile cloud computing
middleware
Metadata Discovery Problem
metadata
meta data
android
image file
File discovery service
distributed mobile-cloud apps
Distributed databases
Decision trees
Decision Tree
context-aware file discovery system
context-aware file discovery service
Computation offloading
composability
cloud-based metadata server
Cloud Computing
CAFDS
Android (operating system)
biblio
Zero-Trust Hierarchical Management in IoT
Submitted by grigby1 on Mon, 08/05/2019 - 10:39am
IoT networks
Zero-Trust Management
zero-trust hierarchical mining process
zero-trust hierarchical management
zero trust
Scalability
Resiliency
resilience
Reliability
pubcrawl
policy-based governance
middleware
blockchain
Internet of Things
Human Factors
Human behavior
Hierarchical Mining
exponential scalability
edge computing
Data mining
contracts
constrained infrastructure
computer network management
blockchain-based middleware
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »