Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Efficient Reduction of the Transmission Delay of the Authentication Based Elliptic Curve Cryptography in 6LoWPAN Wireless Sensor Networks in the Internet of Things
Submitted by aekwall on Mon, 11/29/2021 - 12:53pm
Peer-to-peer computing
wireless sensor networks
Wireless Sensor Network
Wireless personal area networks
Wireless communication
RPL
Routing protocols
Resiliency
pubcrawl
Metrics
Mesh-under
Internet of Things
delays
composability
CoAP
authentication
6LoWPAN
wireless mesh networks
biblio
Trust Computational Heuristic for Social Internet of Things: A Machine Learning-Based Approach
Submitted by grigby1 on Mon, 11/29/2021 - 12:34pm
Aggregates
Computational modeling
Human Factors
Internet of Things
machine learning
Mathematical model
Measurement
pubcrawl
Scalability
Social Agents
Social Internet of Things
Task Analysis
Trust management
biblio
SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications
Submitted by grigby1 on Mon, 11/08/2021 - 3:47pm
Resiliency
composability
Internet of Things
IoT
IoT security
Measurement
Mobility Metrics
pubcrawl
resilience
wireless sensor networks
Routing
Routing protocols
RPL attacks
Scalability
security
Transportation
trust
Trust Routing
biblio
Personal Trusted Platform Module for the Multi-Core System of 5G Security and Privacy
Submitted by grigby1 on Mon, 11/08/2021 - 12:44pm
Internet of Things
МС 127.05 module
Virtualization Based Security
ULSI 1879VM8Ya
trusted platform modules
Trusted Platform Module
Resiliency
resilience
policy setting
NeuroMatrix Core 4
MPSoC
pubcrawl
Internet of smart (mobile) CPSs
cyber-physical systems
cyber physical systems
cyber physical security
confidentiality
computer security
composability
blocking application
ARM Cortex-A5
biblio
Tamarin software – the tool for protocols verification security
Submitted by aekwall on Tue, 10/12/2021 - 2:06pm
Software
privacy
Internet of Things
Protocols
tools
encryption
pubcrawl
composability
standards
Compositionality
Safety
policy-based governance
security protocols
sensor networks
Tamarin software
protocol verification
biblio
Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
clustering
Computer hacking
data privacy
Human behavior
Indexes
Internet of Things
loT
Measurement
privacy
privacy-aware policies
Privacy Policies
pubcrawl
Scalability
security
biblio
Contextual Privacy Policy Modeling in IoT
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
IoT Privacy Taxonomy
taxonomy
smart buildings
Scalability
pubcrawl
Privacy Policy
Privacy Policies
Privacy Formalization
privacy
Context
IoT
Internet of Things
Intelligent sensors
Human behavior
data privacy
Cyberspace
cyber-physical systems
Context modeling
biblio
Smart Grid Security: Attack Modeling from a CPS Perspective
Submitted by grigby1 on Tue, 10/12/2021 - 1:46pm
Analytical models
composability
Computational modeling
computer security
Internet of Things
Metrics
Object recognition
power grid vulnerability
power grid vulnerability analysis
pubcrawl
Resiliency
Smart Grids
Training
biblio
Exploration of Smart Grid Device Cybersecurity Vulnerability Using Shodan
Submitted by grigby1 on Tue, 10/12/2021 - 1:43pm
Resiliency
Vulnerability
Text processing
Stability analysis
smart meters
smart meter
Smart Grids
Smart Grid
shodan
SCADA systems
Smart Grid Sensors
pubcrawl
power inverter
power grid vulnerability analysis
power grid vulnerability
Metrics
Inverters
Internet of Things
Cybersecurity
composability
biblio
Federated TONİoT Windows Datasets for Evaluating AI-Based Security Applications
Submitted by grigby1 on Mon, 10/04/2021 - 1:51pm
operating systems
Windows operating systems
Virtual machining
testbed
security
Resiliency
resilience
pubcrawl
Operating systems security
AI-based security applications
Metrics
Intrusion Detection
Internet of Things
Federated datasets
data privacy
Computer crime
composabilty
Cloud Computing
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »