Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Remote Access Control Model for MQTT Protocol
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
access control model
data deletion
TLS protocol
third-party services
remote access control model
OAuth protocol
Internet of Things security problems
device discretionary access control model
data transferring
access privileges
access matrix
security
secure access control
MQTT protocol
MQTT
privacy
pubcrawl
Cryptographic Protocols
Internet of Things
authorisation
Scalability
computer network security
biblio
Big Data Encryption Technology Based on ASCII And Application On Credit Supervision
Submitted by grigby1 on Mon, 12/28/2020 - 12:39pm
data utilization
user privacy
user payment information
Scalability
Resiliency
resilience
pubcrawl
Metrics
market supervision business
Licenses
Internet of Things
Human behavior
financial data processing
Electronic mail
electronic data interchange
Desensitization
Artificial Intelligence
data privacy
data leakage
Data Governance
data desensitization technology
Cryptography
Cross-Platform
credit supervision application
Credit Supervision
credit construction
Conferences
BIGDATA
big data privacy
Big Data encryption technology
Big Data
ASCII
biblio
Design and Realization of Smart Home Security System Based on AWS
Submitted by grigby1 on Mon, 12/28/2020 - 12:30pm
Wireless fidelity
Wi-Fi access
software design
smart home security system
sensor systems and applications
PSoC
aws iot
bluetooth security
Smart homes
Internet of Things
testing
composability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
wireless LAN
bluetooth security
study Bluetooth security
study Bluetooth device security
proof-of-concept DoS attack
operation necessitates special hardware
frequency-hoping spread spectrum technique
forming ad hoc networks
device-to-device communications
concept denial
Bluetooth technologies
Bluetooth IoT devices
Bluetooth devices security
denial of service
wireless networks
human computer interaction
tools
Ad hoc networks
composability
standards
personal area networks
Protocols
telecommunication security
Software
computer network security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
security
Internet of Things
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
Attack detection
trust value security
time 0.5518318 s
PHP database
On-offAttack
on-off attack
Object
MySQL database
trustworthiness management
IoT object security
MQTT
security of data
Topology
trustworthiness
network topology
authentication
SQL
Databases
composability
pubcrawl
Internet of Things
Servers
biblio
Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
Configurability
utility calculation
trustworthy operation
trustworthiness profiles
profile
modular model
modular extensible approach
Industrial IoT
Industrial Internet Security Framework
industrial internet consortium
dynamically evaluable form
dynamic evaluation
dynamic assessment
cross-company Industry
computer network security
behaviour-based context-based
automatically verifiable operations
automatable trust models
regulatory requirements
trustworthiness
production engineering computing
supply chain management
supply chains
Metrics
composability
pubcrawl
Trusted Computing
Internet of Things
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »