Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Artificial Intelligence and Internet of Things for Robotic Disaster Response
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
Mobile Robot
deep learning model training
Disaster Response
disaster site
disaster-straining robots
environmental Big Data
field workstation
Fukushima nuclear disaster
ground robots
intelligent Internet of Things
AIoT
model verification
natural man-made disasters
on-site continuing objects classification
robotic disaster response
surface robots
underwater swarm robots
Unmanned underwater vehicles
Wenchuan earthquake
image classification
Internet of Things
learning (artificial intelligence)
pubcrawl
composability
mobile robots
Swarm Intelligence
neural nets
Workstations
Big Data
Artificial Intelligence
control engineering computing
Robot sensing systems
Compositionality
government agencies
emergency management
disasters
Service robots
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
Internet of Things
text-based methods
text analysis
static characteristic extraction method
Resiliency
resilience
pubcrawl
privacy
Metrics
malware detection
Malware Analysis
malicious code
IoT malware detection
IoT
invasive software
C500-CFG
Human behavior
high-complexity programs
graph theory
feature information
feature extraction
dynamic programming
Ding's NP-hard problem
decom-piled executable codes
control flow-based features
control flow graph
computer network security
computational complexity
C500-CFG algorithm
biblio
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
privacy
invasive software
IoT malware samples
learning (artificial intelligence)
malware
Malware Analysis
malware detection
Metrics
off-the-shelf adversarial attack methods
Internet of Things
pubcrawl
resilience
Resiliency
robust detection tools
security
static analysis
tools
adversarial learning
Human behavior
graph-based IoT malware detection systems
graph theory
graph embedding
graph analysis
generated adversarial sample
GEA approach
feature extraction
deep learning networks
deep learning
craft adversarial IoT software
control flow graph-based features
CFG-based features
benign sample
augmentation method
biblio
Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
UAVs
value-added services
standardisation
standard gap analysis
solid technical foundation
security-critical data
security-critical
regulatory foundation
quality living
optimised management
mobile IoT devices
Gap Analysis
data-driven systems
Data Protection and Privacy
Unmanned Aerial Vehicles
data privacy
autonomous aerial vehicles
interoperability
trustworthiness
Energy Efficiency
Data protection
standards
composability
pubcrawl
Trusted Computing
Protocols
privacy-sensitive data
security
Internet of Things
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
context-aware approach
trustworthiness inference framework
trust generation
trust elements
sociological principles
social networking
recommendation trust
psychological principles
kernel-based nonlinear multivariate grey prediction model
kernel-based nonlinear multivariate grey prediction
internal similarity trust
human behaviors
fuzzy logic method
familiarity trust
external similarity trust
context-aware trustworthiness inference framework
Internet of Things
Social Internet of Things
grey systems
psychology
Trust management
Predictive models
trustworthiness
Fuzzy logic
smart objects
direct trust
Reliability
social networking (online)
composability
pubcrawl
Trusted Computing
Protocols
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
neural style transfer
trusted solution
trusted platform modules
Trusted Computing
tpm
telecommunication security
software trusted platform module
software integrity
security issues
Scalability
Resiliency
reasonable computational power
pubcrawl
Predictive Metrics
antivirus
message authentication
IoT devices
IoT
Internet of Things
HMAC values
HMAC
hashed message authentication code
cyber-physical system security
Cryptography
Cryptographic Protocols
cryptographic operations
composability
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Dominance as a New Trusted Computing Primitive for the Internet of Things
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
resilience
Latches
mainstream IoT devices
neural style transfer
Nucleo-L476RG
operating systems
Predictive Metrics
pubcrawl
Raspberry Pi Compute Module 3
large-scale IoT deployments
Resiliency
Scalability
security of data
sensors
separate service processors
Servers
Trusted Computing
trusted platform modules
geographical area
central entity
CIDER performance overhead
CIDER system
composability
cyber-physical system security
dominant computing paradigms
firmware
firmware image
Authenticated-Watchdog-Timer
Hardware
HummingBoard Edge
Internet of Things
Internet-of-Things
IoT
IoT hardware
IoT platforms
large-scale industrial deployments
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »