Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Security Weaknesses and Attacks on the Internet of Things Applications
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
privacy
wireless sensor networks
Smart homes
Smart Home
smart farm
smart car
smart campus
security weaknesses
security of data
security
resilience
pubcrawl
Protocols
Data collection
policy-based governance
objects information
Metrics
IoT environment
IoT devices
IoT attacks
IoT applications
Internet of Things applications
Internet of Things
internet
Human behavior
Healthcare
biblio
Trust-Based Framework for Resilience to Sensor-Targeted Attacks in Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
sensor-targeted attacks
Observers
policy-based governance
primary sensor
process control
process state
pubcrawl
resilience
Resiliency
Safety
Scalability
security
networked control systems
sensors
Silicon
stability
standard protocols
state estimates
state estimation
trust-based framework
Trusted Computing
weighted consensus
wireless sensor networks
false trust
closed loop systems
closed-loop control
collaboration
communication infrastructure
compromised sensors
computer network security
cyber-physical plants
cyber-physical systems
entire plant
false data injections
CPS resilience
far-flung locations
feedback
feedback signal
interconnected processes
local data
local process
malicious agents
Measurement
Monitoring
multisensor networked physical experiment
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 10:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by aekwall on Mon, 06/10/2019 - 10:17am
Resiliency
wireless sensor networks
user security
traffic morphing
traffic analysis attack mitigation
telecommunication traffic
telecommunication security
telecommunication network routing
splitting traffic
Smartphones
smartphone sales
smartphone apps
smart phones
security
Routing
Ad hoc networks
Relays
pubcrawl
probability
privacy
multipath routing scheme
mobile computing
mobile ad hoc networks
Metrics
MANET Attack Mitigation
identifying apps
flow routing optimization problem
edge network assistance
data privacy
composability
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 3:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »