Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
IoT Kill Chain
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Probabilistic logic
privacy
Predictive models
Object recognition
attack surface
Internet of Things
Cyber Kill Chain
Chained Attacks
botnets
botnet
Attacks on IoT Devices
Attack Structure
Metrics
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
Deep Learning for Spectrum Anomaly Detection in Cognitive mmWave Radios
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
millimetre wave communication
auxiliary classifier generative adversarial network
Cognitive mmWave Radios
Cognitive Radios
complex dynamic radio environment
conditional generative adversarial network
dynamic radio spectrum
Generative Models
Millimeter Wave
Millimeter Wave band
AC-GAN
mmWave dataset
mmWave spectrum
secure radios
shared access medium
spectrum anomalies
spectrum anomaly detection
variational auto encoder
Cognitive Radio Security
Anomaly Detection
telecommunication security
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Communication system security
Wireless communication
neural nets
Training
Internet of Things
probability
telecommunication computing
generative adversarial networks
deep learning
radio spectrum management
Gallium nitride
cognitive radio
deep generative models
file
Performance improvement of anomaly detection on IoT network
Submitted by akarns on Fri, 03/12/2021 - 3:54pm. Contributors:
Latha Suryavanshi Karakos
Jumoke Ladeji-Osias
ABSTRACT
Decision Tree
Internet of Things
Intrusion Detection
IoT
IoTID20
Performance
Presentations
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 3:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
Performance Analysis on Enhanced Round Function of SIMECK Block Cipher
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
enhanced round function
policy-based governance
Human Factors
security measurements
Performance analysis
lightweight block ciphers
security requirements
resource-constrained devices
Internet of Things technologies
security level
algorithm design
enhanced ARX structure
Cryptography
LBC
IoT
encryption time
SIMON
SIMECK family block cipher
avalanche effect
Brute-force Attack
brute force attacks
software performance evaluation
Internet of Things
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
Resiliency
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
learning (artificial intelligence)
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
false positive rate
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
accurate classification methods
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »