Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT
biblio
Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN
Submitted by grigby1 on Thu, 09/16/2021 - 2:12pm
Radio frequency identification (RFID)
Voronoi cells
Two dimensional displays
traffic characterization
security
RFIDs
RFID security
RFID
Resiliency
resilience
radiofrequency identification
Adaptation models
radio frequency identification
pubcrawl
NFC
IoT
Human behavior
Computational modeling
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Distributed Key Management Authentication Algorithm in Internet of Things (IOT)
Submitted by grigby1 on Thu, 09/16/2021 - 2:11pm
radio frequency identification
Servers
security
RFIDs
RFID tags
RFID
Resiliency
resilience
Radio frequency identification (RFID)
authentication
pubcrawl
Protocols
IoT
Internet of Things
Human behavior
distributed algorithm
authentication algorithm
biblio
Security Monitoring System Using Magnetically-Activated RFID Tags
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
radio frequency identification
Switches
sensors
security monitoring
RFIDs
RFID
Resiliency
resilience
reed switch
Radio frequency identification (RFID)
Antenna measurements
pubcrawl
proximity sensor
Passive RFID tags
Monitoring
magnetic sensors
IoT
Human behavior
Entry detection
antennas
biblio
Presenting IoT Security based on Cryptographic Practices in Data Link Layer in Power Generation Sector
Submitted by grigby1 on Wed, 09/01/2021 - 2:13pm
IoT
Scalability
SCADA
RSA
Reliability
pubcrawl
power generation
PLC
optimization
NTPC.
AES
Internet of Things
I/O
i-o systems security
DES
DDCMIS
DCS
Cryptography
control systems
biblio
Secure Communication Using Steganography in IoT Environment
Submitted by grigby1 on Tue, 08/31/2021 - 12:58pm
Complexity theory
Cryptography
Heuristic algorithms
image segmentation
IoT
microcontroller
microcontrollers
performance evaluation
PSNR
pubcrawl
QR code
QR codes
resilience
Resiliency
Steganography
biblio
Secure data exchange between IoT endpoints for energy balancing using distributed ledger
Submitted by grigby1 on Tue, 08/31/2021 - 11:05am
Metrics
Stakeholders
Smart Grids
security
Resiliency
resilience
relational databases
relational database security
pubcrawl
blockchain
IoT
Human behavior
Energy balancing
distributed ledger
Distributed databases
demand response
composability
biblio
Lightweight block ciphers for resource-constrained devices
Submitted by grigby1 on Wed, 08/18/2021 - 11:15am
NIST
wireless sensor networks
Signal processing algorithms
Scalability
Resiliency
resilience
radiofrequency identification
pubcrawl
performance evaluation
Algorithm
Market research
Lightweight Encryption
Lightweight Ciphers
IoT
Cryptography
Ciphers
Block Cipher
biblio
The Ideal Block Ciphers - Correlation of AES and PRESENT in Cryptography
Submitted by grigby1 on Wed, 08/18/2021 - 11:15am
PRESENT block cipher
Ultra-light weight
timing
sensors
Scalability
Resiliency
resilience
Registers
pubcrawl
AES cipher
Lightweight Ciphers
IoT
Hardware
encryption
Cryptography
Conferences
Ciphers
Area
biblio
A Secure Platform for IoT Devices based on ARM Platform Security Architecture
Submitted by grigby1 on Thu, 08/12/2021 - 4:23pm
Microprogramming
TrustZone
security service
security
Resiliency
resilience
pubcrawl
PSA
Program processors
composability
Metrics
machine-to-machine communications
IoT security
IoT
Human behavior
Hardware
Cryptography
computer architecture
biblio
IoT Threat Detection Advances, Challenges and Future Directions
Submitted by grigby1 on Thu, 08/12/2021 - 4:22pm
architecture
challenges
composability
computer architecture
Computer crime
future directions
Human behavior
IoT
IoT security
Metrics
pubcrawl
resilience
Resiliency
sensors
Task Analysis
threat detection
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »