Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT Security 2018
biblio
A method to detect Internet of Things botnets
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
IoT Security 2018
widespread botnets
unauthorized access
security of data
security
Resiliency
pubcrawl
Protocols
performance evaluation
Metrics
malware
main security problems
Logistics
logistic regression
authorisation
IoT devices
IoT
invasive software
Internet of Things
Human behavior
Cybersecurity
computer network security
composability
common characteristics
botnets
Botnet detection
botnet
biblio
Internet of Nano Things: Security Issues and Applications
Submitted by aekwall on Mon, 05/20/2019 - 10:00am
IoT Security 2018
security challenges
nanotechnology
IoNT security
IoNT applications
Internet of Nano Things
Metrics
composability
pubcrawl
Human behavior
Resiliency
Internet of Things
biblio
Pervasive Smart Contracts for Blockchains in IoT Systems
Submitted by aekwall on Mon, 05/20/2019 - 9:58am
Pervasive Computing Security
blockchains
composability
Human behavior
Internet of Things
IoT Security 2018
Metrics
microservices
pubcrawl
Resiliency
smart contracts
biblio
Deriving Privacy and Security Considerations for CORE: An Indoor IoT Adaptive Context Environment
Submitted by aekwall on Mon, 05/20/2019 - 9:58am
security
Resiliency
Human behavior
pubcrawl
composability
Metrics
privacy
Ambient intelligence
architectural framework
Internet-of-Things
IoT Security 2018
biblio
Replay-resilient Authentication for IoT
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
composability
device authentication
Human behavior
Internet of Things
IoT Security 2018
Metrics
pubcrawl
Resiliency
RFID
RFIDs
biblio
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
Resiliency
Human behavior
pubcrawl
composability
Metrics
privacy
authentication
Internet of Things
identity
IoT Security 2018
biblio
A smart middleware to detect on-off trust attacks in the Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
security of data
on-off trust attacks
performance evaluation
Pervasive Computing Security
policy-based governance
pubcrawl
real-time systems
Resiliency
security
On-Off Attacks
sensors
service providers
service requesters
smart middleware
sophisticated trust threat
trust
Trusted Computing
complex environment
node behavior
middleware security
middleware
Metrics
malicious device
low trust node
IoT Security 2018
IoT resources trust
Internet of Things designs
Internet of Things
internet
Human behavior
heterogeneous environment
Data models
composability
biblio
Penetration Testing for Internet of Things and Its Automation
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
machine to machine technologies
traditional internet
Systems Security
security problems
security of data
RFID
Resiliency
radiofrequency identification
radio frequency identification
pubcrawl
penetration testing approach
Penetration Testing
Metrics
automation
IoT Security 2018
IoT security
IoT
Internet of Things
internet
Human behavior
Hardware
GPS
composability
belief-desire-intention (BDI) model
belief-desire-intention
BDI model
biblio
Internet of Things (IoT) Increasing the Necessity to Adopt Specific Type of Access Control Technique
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
IoT
Servers
sensors
security.
security aspect
Resiliency
pubcrawl
privacy aspect
Metrics
IoT Security 2018
Access Control
Internet of Things
Human behavior
data privacy
computer architecture
composability
Cloud Computing
authorisation
access control technique
access control area
biblio
(WIP) Authenticated Key Management Protocols for Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 9:56am
key management
telecommunication security
Smart homes
Self-certified keys
security operations
security analysis show
seamless incorporation
Resiliency
Public key
pubcrawl
Protocols
noninteractive key management protocol
Metrics
authenticated key management protocols
IoT Security 2018
IoT
Internet of Things authentication
Internet of Things
interactive key management protocol
Human behavior
heterogeneous end systems
different end systems
data privacy
Cryptographic Protocols
composability
authentication
1
2
next ›
last »