Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
An Approach of BLE Mesh Network For Smart Home Application
Submitted by aekwall on Mon, 03/01/2021 - 4:44pm
Internet of Things
security
Resiliency
pubcrawl
composability
Metrics
Mesh networks
Smart Home
Random access memory
Bluetooth
Smart homes
Wireless fidelity
Bluetooth mesh
home security
Wireless Mesh Network Security
biblio
LoRa Mesh Network with BeagleBone Black
Submitted by aekwall on Mon, 03/01/2021 - 4:43pm
LoRa mesh network
radio transceivers
transceivers
BeagleBone Black
BeagleBone Black wireless single-board Linux computers
chirp spread spectrum
coding rate
long range
long range transceivers
lora
spread spectrum communication
LoRa node
MESH network
Python code
receiving nodes
spread factor
transmission intervals
transmitting nodes
Wireless Mesh Network Security
Python
Internet of Things
Linux
Resiliency
pubcrawl
composability
Synchronization
Wireless communication
Metrics
IoT
Bandwidth
Mesh networks
wireless mesh networks
Computers
encoding
relay networks (telecommunication)
relay
Low power
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things
Submitted by aekwall on Mon, 02/22/2021 - 1:36pm
iobt
storage resources
Scalability
resource-constrained nodes
Resiliency
pubcrawl
proof of common interest
NDN for IoBT
NDN
named data networking
named data network data-centric approach
IoBT setting
IoBT network
IoBT environment
Human Factors
Internet-of-Battlefield-Things
Internet of Things
internet
immutable trustworthy-distributed ledger feature
Human behavior
electronic data interchange
data privacy
data exchange
computer network security
blockchain technologies
Blockchain for IoBT
IoBT Security
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 1:40pm
documentation
Damage Assessment
smart buildings
smart building stakeholders
smart building risk assessment methodology
smart building risk assessment case study
inter-networked control systems
cost effective risk management
comprehensive risk assessment process
Stakeholders
cyber-physical systems
building management systems
Internet of Things
risk analysis
Buildings
control systems
control engineering computing
Resiliency
resilience
pubcrawl
Monitoring
security
risk management
security of data
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
Protocols
SDN technology
real-time entropy features
Partial flow
packet count entropies
openflowbased switch capabilities
OpenFlow
DDoS attack detection capabilities
categorized partial-flows
software-defined networking
DDoS attack detection
computer networks
Switches
software defined networking
SDN
Internet of Things
real-time systems
composability
Entropy
Computer crime
internet
IoT devices
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
feature extraction
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Reliability
dynamic networks
software analysis
offline data analysis
live traffic monitoring
Google Home
Google devices
dynamic analysis security testing infrastructure
Amazon devices
security testing
Amazon Echo
dynamic analysis
Google
testing
security controls
Internet of Things
network traffic
composability
telecommunication traffic
data privacy
IoT devices
computer network security
Resiliency
resilience
Metrics
pubcrawl
IoT
Monitoring
data analysis
security
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »