Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Data Analytics-Enabled Intrusion Detection: Evaluations of ToNİoT Linux Datasets
Submitted by aekwall on Wed, 07/07/2021 - 5:09pm
Intrusion Detection
virtualization privacy
security
Resiliency
pubcrawl
privacy
operating systems
Metrics
Linux Systems
Linux
Linux Operating System Security
Internet of Things
Human behavior
dataset
data privacy
Cyber Attacks
computer architecture
composability
Artificial Intelligence
biblio
TCB Minimization towards Secured and Lightweight IoT End Device Architecture using Virtualization at Fog Node
Submitted by aekwall on Wed, 07/07/2021 - 5:09pm
secured architecture
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
Virtual machine monitors
trusted computing base
TCB Minimization
security
Metals
Lightweight Architecture
IoT End Device
Internet of Things
computer architecture
privacy
Software
Minimization
biblio
Reliable abnormal event detection from IoT surveillance systems
Submitted by aekwall on Wed, 07/07/2021 - 4:57pm
security
Internet of Things
Cameras
surveillance
video surveillance
activity detection
feature extraction
house caring
machine learning
machine learning algorithms
Videos
pubcrawl
Metrics
Resiliency
Human behavior
biblio
A Security Model of Ubiquitous Power Internet of Things Based on SDN and DFI
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
security
Human Factors
Internet of Things
Protocols
SDN
Databases
DFI
OpenFlow
power Internet of Things
power systems
Switches
Ubiquitous Computing Security
pubcrawl
Scalability
Metrics
Resiliency
biblio
Design of Terminal Security Access Scheme based on Trusted Computing in Ubiquitous Electric Internet of Things
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
Cryptography
Monitoring
Human Factors
computer architecture
Internet of Things
Conferences
information technology
secure access
terminal access
Trusted Computing
ubiquitous electric internet of things
Ubiquitous Computing Security
pubcrawl
Scalability
Metrics
Resiliency
biblio
A Trustworthy Blockchain based framework for Impregnable IoV in Edge Computing
Submitted by grigby1 on Wed, 06/30/2021 - 3:58pm
Internet of Things
smart cities
Scalability
Resiliency
resilience
pubcrawl
Metrics
Internet of Vehicles (IoV)
Internet of Vehicles
Internet of Things (IoT)
blockchain
Intelligent vehicles
Human Factors
Human behavior
green computing
Edge computing (EC)
edge computing
cyber physical systems
Cryptography
Blockchain (BC)
biblio
A Blockchain Model for Secure Communications in Internet of Vehicles
Submitted by grigby1 on Wed, 06/30/2021 - 3:57pm
pubcrawl
vehicular ad hoc networks
software-defined networking
security
secure communications
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
blockchain
Metrics
Internet of Vehicles
Internet of Things
Human Factors
Human behavior
High Performance Blockchain Consensus
cyber physical systems
Computational modeling
biblio
Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System
Submitted by grigby1 on Wed, 06/30/2021 - 3:20pm
Internet of Things
Wireless communication
sensors
Sensor Systems
scientific computing
Resiliency
resilience
reliable data
Reliability
pubcrawl
Trustworthy Systems
Human Factors
Human behavior
faulty sensor detection
False Data Detection
event detection
Data models
data acquisition
cyber physical systems
composability
biblio
Security Assessment in Foggy Era through Analytical Hierarchy Process
Submitted by aekwall on Mon, 06/28/2021 - 12:37pm
Fog computing
security
Cloud Computing
edge computing
Fog Computing and Security
Hierarchy
Internet of Things
Internet of Things (IoT)
privacy
Protocols
pubcrawl
real-time systems
Resiliency
Scalability
biblio
Fog Computing Security Assessment for Device Authentication in the Internet of Things
Submitted by aekwall on Mon, 06/28/2021 - 12:36pm
Fog computing
security
authentication
authentication requirements
Cloud Computing
computer architecture
fog architecture
Fog Computing and Security
fog security
Internet of Things
Internet of Things security
privacy
pubcrawl
Resiliency
Scalability
security management
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »