Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT
biblio
Multi-Level Security for the 5G/IoT Ubiquitous Network
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
Internet of Things
Ubiquitous Computing Security
Transaction Data
Temperature measurement
security model
Scalability
Resiliency
pubcrawl
network domain
network bandwidth
multilevel security model
Multi-Level Security
Metrics
IoT
5G
information security domain
Human Factors
Human behavior
fifth-generation mobile communication networks
Context modeling
Context
computer network security
Computational modeling
BLP
Access Control
5G-IoT ubiquitous network
5G mobile communication
biblio
Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures
Submitted by grigby1 on Tue, 02/06/2018 - 12:47pm
Internet of Things
sensors
security
Scalability
Resiliency
pubcrawl
proliferation
parallel processing
nanotechnology
miniaturization
Metrics
IoT infrastructures
IoT
Big Data
forensic evidence
Digital Forensics
Data Security
data exchange
cybercrime activities
cloud-computing
cloud-centric framework
Cloud Computing
CFIBD-IoT framework
business processes
big data security in the cloud
Big data isolation
biblio
Hybrid Cloud Computing and Integrated Transport System
Submitted by grigby1 on Tue, 02/06/2018 - 12:47pm
IoT
urban transportation
Transportation
sensors
security
Scalability
Resiliency
pubcrawl
Organizations
mobility concepts
Metrics
automation system
Intelligent Transportation Systems
integration
integrated transport system
hybrid cloud computing system
hybrid cloud computing
Cloud Computing
big data security in the cloud
Big Data management techniques
Big Data
biblio
Measures of Network Centricity for Edge Deployment of IoT Applications
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
big data security metrics
Buildings
Cloud Computing
Computational modeling
edge computing
Fog computing
IoT
Metrics
Monitoring
Network Centricity
Performance analysis
pubcrawl
Resiliency
Scalability
sensors
Servers
biblio
Big Data Source Location Privacy and Access Control in the Framework of IoT
Submitted by grigby1 on Tue, 02/06/2018 - 12:42pm
IoT
Servers
security
Scalability
Resiliency
pubcrawl
Protocols
privacy
Policy
mobile devices
Metrics
location
Access Control
Internet of Things
Human Factors
generator objects
encryption
data privacy
Data models
Cryptography
big data source location privacy
big data privacy
Big Data
biblio
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Submitted by grigby1 on Fri, 02/02/2018 - 12:25pm
Post-quantum
timing
SoCs
security
Scalability
Resiliency
quantum computing security
quantum computing
pubcrawl
Cache Attack
NTRUEncrypt
Metrics
Lattices
IoT
Hardware
encryption
composability
biblio
A multi-factors security key generation mechanism for IoT
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
multi-factors
self-organising network
self-organising Internet of Things network
self-adjusting systems
security of data
security
Resiliency
pubcrawl
Protocols
multifactors security key generation mechanism
Multi-Level Security
Ad Hoc Network Security
Logic gates
IoT security
IoT nodes
IoT
Internet of Things
Human Factors
Human behavior
Cryptography
composability
Ad hoc networks
biblio
Toward resilient networks with fog computing
Submitted by K_Hooper on Fri, 02/02/2018 - 10:07am
IoT
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
core network
delays
Disruption Tolerance
edge computing
edge networks
Fog computing
Future Internet
Internet of Things
toward resilient networks
IoT architecture
network resilience
network traffic
ns-3 network simulation
on-demand computing power
Open-Fog
pubcrawl
Resiliency
Resilient Security Architectures
security
Survivability
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
MUTARCH: Architectural diversity for FPGA device and IP security
Submitted by grigby1 on Tue, 01/23/2018 - 2:24pm
policy-based governance
IP security
logical configuration keys
logic circuits
microprocessor chips
modern remote upgrade techniques
MUTARCH
physical configuration keys
Policy
IP piracy
pubcrawl
Resiliency
security through diversity principle
static keys
Table lookup
time-varying keys
Transforms
unauthorized in-field reprogramming
field programmable gate arrays
automotive systems
biomedical systems
bitstream encryption
collaboration
composability
configuration file
diverse applications
encryption
architectural diversity
FPGA device
Hardware
in-field reconfiguration
intellectual property blocks
Internet of Things
IoT
IP blocks
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »