Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT
biblio
Secure Routing for MANET Connected Internet of Things Systems
Submitted by grigby1 on Mon, 09/09/2019 - 9:57am
Resiliency
trusted device
telecommunication security
standardized routing protocol for low-power and lossy networks
sensor network
security threats
security enhanced routing protocols
security
Secure Routing
RPL
Routing protocols
Routing
Compositionality
resilience
pubcrawl
network security
mobile ad hoc networks
Metrics
MANET-IoT connectivity
MANET-connected Internet-of-Things systems
MANET security
MANET
IoT
Internet of Things
biblio
RMDD: Cross Layer Attack in Internet of Things
Submitted by grigby1 on Mon, 08/26/2019 - 10:10am
PAN
Throughput
telecommunication network topology
TCP
stealthy attack
single protocol layer
Simultaneous attack
security
RPL
Routing protocols
Routing
Resiliency
resilience
rank manipulation and drop delay cross-layer attack
pubcrawl
6LoWPAN
IPv6
IoT
Internet of Things
intensity attack
intelligent attack
DODAG
DAG
cross-layer
Cross Layer Security
coordinated attack
computer network security
composability
brutal attack
biblio
Resilience of Stateful IoT Applications in a Dynamic Fog Environment
Submitted by grigby1 on Mon, 08/26/2019 - 10:05am
Compositionality
Cyber Dependencies
Cyber-physical Interactions
dynamicity
fault tolerance
Fog computing
heterogeneity
Human behavior
Human Factors
IoT
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Solving Internet's Weak Link for Blockchain and IoT Applications
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
Internet of Things
authentication
blockchain
Cryptography
Decentralized Security
Digital signing
encryption
Hardware Security
Human behavior
security weaknesses
IoT
Key storage
Metrics
policy-based governance
Private keys
pubcrawl
resilience
SECP256K1
biblio
Attribute Based Content Security and Caching in Information Centric IoT
Submitted by aekwall on Mon, 08/05/2019 - 9:45am
Router Systems Security
Ciphertext policy attribute-based encryption
Information Centric Networks
information-centric networks
IoT
pubcrawl
Resiliency
Scalability
secure communications
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 9:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Deployment of IoT-based Honeynet Model
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
security
IoT
SCADA
Resiliency
Human behavior
pubcrawl
composability
Honypots
ICs
SCADA Systems Security
biblio
IoT Standardisation: Challenges, Perspectives and Solution
Submitted by grigby1 on Mon, 07/01/2019 - 9:02am
computer security
cyber threats
Human behavior
Human Factors
IoT
legislation
privacy
pubcrawl
resilience
Resiliency
Scalability
security audit
Security Audits
standards
biblio
Combining MUD Policies with SDN for IoT Intrusion Detection
Submitted by grigby1 on Fri, 06/28/2019 - 9:41am
Intrusion Detection
IoT
MUD
pubcrawl
resilience
Resiliency
Scalability
SDN
SDN security
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »