Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
iobt
visualization
sharding approach
Sharding
Scalability
pubcrawl
NS-3 Simulation
networked battlefield scenario
mission-critical IoBT environment
Mission critical systems
military computing
military communication
military applications
lightweight blockchain
IoBT devices
blockchain
Internet-of-Battlefield-Things
Internet of Things
Internet of battlefield things
internet
Human Factors
Heuristic algorithms
FastChain simulator
drones
Decentralized Consensus
Cryptography
Computational modeling
communication resources
blockchain enabled IoBT scenarios
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
biblio
Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:48pm
Jamming
time-critical mission
soldier IoBT transmission link
soldier
security
secure Internet of Battlefield Things systems
Scalability
pubcrawl
psychology
psychological self-confirming equilibrium
psychological game
learning (artificial intelligence)
antijamming mechanism
IoBT network
iobt
Internet of Things (IoT)
Internet of Things
Human Factors
Games
game theory
dynamic psychological game theory
delays
Bayes methods
attacker psychological behavior
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 2:59pm
reverse engineering
Resilient Security Architectures
Product codes
physical unclonable function (PUF)
Maximum likelihood decoding
integrated circuit reliability
Differential Comparator PUF
Current Mirror PUF
arbiter PUF
Transistors
Threshold voltage
Binary codes
security of data
resilience
Decoding
program testing
machine learning
pubcrawl
Resiliency
invasive software
security
Internet of Things
field programmable gate arrays
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
Compositionality
Information Reuse and Security
SUMMON
simulation experiments
simulation environments
open IoT data archiving
IoT-cloud systems
IoT trace archiving service
information retrieval systems
data retrieval
data management services
automated Web crawling service
Cloud Computing
smart cities
visualization
sensor data
Crawlers
web services
Databases
Computational modeling
pubcrawl
Resiliency
Data models
Internet of Things
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 1:19pm
side-channel attacks
Information Reuse and Security
trusted execution environments
TEE integration time
software partitioning
RPC-based solutions
RPC-based framework
RPC based framework
RPC
remote procedure calls
partitioning security components
partitioning
IoT security software
interface definition language files
graphical user interface
graphical user interfaces
security of data
framework
TEE
Compositionality
information security
Java
software engineering
Python
Libraries
pubcrawl
Resiliency
Protocols
security
IoT devices
Internet of Things
Servers
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 2:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:11pm
internet
Servers
sensors
security of data
security
Roads
Resiliency
resilience
pubcrawl
MFemtocell
Metrics
IoEV
Internet of Vehicles
Internet of Things
Internet of electric vehicles
Internet information exhange
5G
Intelligent Transportation Systems
Infrastructure
Human Factors
environmental benefits
Energy Efficiency
energy consumption
energy conservation
electrical vehicle communication
Electric Vehicles
cyber security issues
connected vehicles
Charging stations
battery limit
batteries
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »