Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT
biblio
IoT Sandbox: To Analysis IoT Malware Zollard
Submitted by grigby1 on Wed, 05/09/2018 - 1:54pm
collaboration
composability
IoT
malware
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandbox
sandboxing
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 9:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
Access Control
blockchain
cloud
edge
Human behavior
IoT
pubcrawl
Resiliency
Scalability
security
Security Audits
time-series
biblio
IoT Security Hardware Framework for Remote Maintenance of Legacy Machine Tools
Submitted by K_Hooper on Wed, 05/02/2018 - 9:47am
cyber-secure manufacturing
Human behavior
IoT
M2M
machine tools
Metrics
pubcrawl
remote maintenance
Scalability
Tamper resistance
tamper resistant design
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 10:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Analysis of ICMetrics Features/Technology for Wearable Devices IOT Sensors
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
key generation
wearables security
Wearable devices
wearable computers
Sports Activity Data
Software
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
online services
Accelerometers
IOT sensors
IoT
Internet of Things
ICmetrics
ICMetric
Human behavior
Hardware
feature extraction
encryption keys
encryption
Cryptography
authentication
Apple Watch
biblio
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
Scalability
patient personal information
patient wellness information
personal health
privacy
pubcrawl
Read only memory
resilience
Resiliency
Medical services
security of data
Wearable devices
wearable IoT healthcare applications
wearables security
XC7Z030 - 3fbg676 FPGA device
Xilinx IP cores
Xilinx Zynq-7000
Healthcare
Algorithm design and analysis
Complexity theory
Cyber Attacks
cyber security architecture
Cyber-security
encryption
field programmable gate arrays
health care
AES
Human behavior
Internet of Things
IoT
IoT based healthcare devices
IoT healthcare industry
IP networks
medical information systems
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »