Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
machine-to-machine (M2M)
biblio
Authentication Schemes and Security Issues in Internet Of Everything (IOE) Systems
Submitted by aekwall on Tue, 06/01/2021 - 12:23pm
Internet of Things (IoT)
wireless sensor networks
wireless sensor network (WSN)
Smart Grids
Servers
Sensor Systems
security
pubcrawl
Protocols
people to people (P2P)
people to machine (P2M)
machine-to-machine (M2M)
Smart Grid Sensors
Internet of Things
Internet of Everything (IoE)
Intelligent sensors
Device to Device
Cryptography
computational intelligence
Compositionality
composability
cloud
authentication
actuators
biblio
Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
security
MLBT evaluation model
particle swarm optimisation
Peer-to-peer computing
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
Metrics
security solutions
security threats
Supervisory Control and Data Supervisory Acquisition (SCADA)
telecommunication security
Trusted Computing
VBM2M-C network
vehicular ad hoc networks
vehicular based M2M-C network
XGBoost model
Internet of Things (IoTs)
advsersary node detection
binary particle swarm optimization
Computational modeling
Entropy
entropy based feature engineering
extreme gradient boosting model
false trust
feature extraction
Human behavior
Adversary Models
Internet of Vehi-cles(IoVs)
learning (artificial intelligence)
machine learning
Machine Learning Based Trust (MLBT)
machine learning based trust evaluation model
machine-to-machine (M2M)
machine-to-machine communication
machine-to-machine communications
malicious activity detection
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model