Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Internet of Things
threat vectors
software-defined networking
software defined networking
sequential decision making problems
SDN
Scalability
RL-based threat mitigation
resilience
Reinforcement learning
pubcrawl
neural fitted Q-learning agent
network security management
network behaviour
machine learning
learning (artificial intelligence)
threat mitigation
global network view
Decision Making
computer networks
computer network security
autonomous threat mitigation
autonomous network systems
ATMoS
APT
advanced persistent threat
ad-hoc solutions
active threat mitigation
Human behavior
Metrics
Resiliency
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 3:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
secure authentication
Fuzzy Cryptography
transmission data
Reed Solomon codes
recognition rate results
key agreement
IoT actors
fuzzy vault principle
fuzzy extractor-based key agreement
effective key agreement scheme
computation times
Biometric cryptosystem
Hamming codes
fuzzy extractor
Scalability
data exchange
Reed-Solomon codes
biometrics (access control)
sensors
public key cryptography
fuzzy set theory
authentication
Metrics
pubcrawl
Resiliency
feature extraction
Internet of Things
Cryptography
biblio
Accurate Deep Net Crowd Counting for Smart IoT Video acquisition devices
Submitted by grigby1 on Mon, 01/11/2021 - 1:01pm
IoT cameras
video surveillance
smart IoT video acquisition devices
Self attention network
security system
security
Scalability
Robustness
Resiliency
resilience
pyramid contextual module
pubcrawl
object detection
neural nets
Metrics
Kernel
camera characteristics
Internet of Things cameras
Internet of Things
feature extraction
estimation
deep video
Deep Neural Network
deep net crowd counting
deep architecture
crowdsourcing
crowd management tasks
Crowd density estimation
consistency
computer architecture
Cameras
biblio
IoT Based Smart Video Surveillance System Using Convolutional Neural Network
Submitted by grigby1 on Mon, 01/11/2021 - 12:59pm
Raspberry Pi
microprocessor chips
Mobile Application
mobile computing
MobileNetv2-SSDLite model
object detection
object detection model
police data processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
Smart video surveillance
SMS notification
video signal processing
video surveillance
Web application
crime rate
captured video
client and server architecture
client-server systems
CNN
COCO dataset
common objects in context dataset
convolutional neural nets
convolutional neural network
camera
deep learning
deep video
fully automatic video surveillance systems
image capture
Internet of Things
IoT
IoT based smart video surveillance system
learning (artificial intelligence)
biblio
Modified Grey Wolf Optimization(GWO) based Accident Deterrence in Internet of Things (IoT) enabled Mining Industry
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
patient monitoring
occupational safety
occupational health
mining industry
mine workers
Introduction
industrial accidents
Heart rate
health conditions
accident deterrence
Accident
grey wolf optimization
grey systems
IoT
Deterrence
Personnel
computerised monitoring
optimisation
production engineering computing
pubcrawl
Human behavior
Resiliency
Internet of Things (IoT)
Internet of Things
Scalability
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 12:37pm
Decision trees
vulnerable IoT devices
PoE-IoT devices
PoE-IoT classification
poe
network traffic characteristics
ML
edge intelligence
deep deviation detection
behavior analysis
dpi
deep packet inspection
IoT
Switches
Cameras
computer network security
firmware
Image edge detection
Decision Tree
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Internet of Things
telecommunication traffic
Scalability
Monitoring
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
IoT
telecommunication traffic
Scalability
Resiliency
pubcrawl
network traffic analysis
network traffic
network security
network provider
network attacks
IoT traffic
computer network security
Intrusion Detection
Internet of Things
information protocol.
Hurst parameter
Hurst flow parameter
DPI software system
dpi
deep packet inspection system
deep packet inspection
biblio
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
Virtual private networks
VPN/Non-VPN Traffic Characterization
traffic characterization
Per Application Classification
Multimedia Web sites
Application Identification
deep packet inspection
social networking (online)
deep learning
Scalability
convolutional neural networks
quality of service
internet
pubcrawl
Resiliency
feature extraction
Internet of Things
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »