Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Challenges of IoT Based Smart-Government Development
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
IoT based smart-government development
user study
Smart Government
smart cities
security of data
security
Resiliency
resilience
pubcrawl
privacy
policy-based governance
new generation smart government
collaboration
Investment
Internet of Things (IoT)
Internet of Things
Internet of Everything (IoE)
government data processing
Government 2.0
extended smart-government
Electronic government
e-governments
E-Government
Cybersecurity
biblio
A Conceptual Model for Promoting Positive Security Behavior in Internet of Things Era
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
human factor
Human Behavior and Cybersecurity
security promotion
positive security behavior
IoT users
information security cycle
cyber risks
cyber resilience culture
conceptual model
Human behavior
IoT
public health sector
Human Factors
privacy
Cybersecurity
pubcrawl
telecommunication security
Internet of Things
data privacy
security of data
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
Internet of Things
Security Metrics
security functions
security as a service
pubcrawl
placement optimization
Metrics
IoT security solutions
IoT security framework
IoT network
IoT
Centrality
graph theory
EndToEnd like encryption
edge computing security
edge computing
dominating set
Cryptography
Computing Theory
computer network security
centrality metrics
biblio
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
trust metrics
pubcrawl
reputation models
resilience
Resiliency
Scalability
security
service oriented architecture
service-oriented architecture
multimetrics trust
trust model
trust scores
trust worthiness metrics
trust-based security mechanisms
trust-based service oriented architecture
trustworthy service provider selection
uncertainty
Entropy
Analytical Hierarchy
building-blocks
complex multicriteria decision making
Computational modeling
computer theory
decision criteria
Decision Making
EFAHP Model
analytic hierarchy process
entropy-based fuzzy AHP model
entropy-based fuzzy analytic hierarchy process
fuzzy set theory
Human Factors
Internet of Things
Multi-criteria Decision Making
multicriteria decision-making problem
biblio
Realizing Dynamic Network Slice Resource Management based on SDN networks
Submitted by aekwall on Mon, 10/05/2020 - 12:00pm
network service features
control plane
SDN technology
control layer
customized services
dynamic network slice resource management
dynamic network slice resource scheduling
end-to-end network
multiple virtual networks
network management authority
telecommunication scheduling
network slicing framework
SDN monitoring
SDN networks
service quality
software defined networking (SDN)
streaming services
virtual network
Dynamic Networks and Security
Metrics
Internet of Things
Internet of Things (IoT)
computer architecture
computer network management
network layer
software defined networking
Resiliency
pubcrawl
composability
Cloud Computing
5G mobile communication
network slicing
Switches
Software Defined Network
5G
communication technology
Dynamic scheduling
data plane
biblio
A Rigorous System Engineering Process for Resilient Cyber-Physical Systems Design
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
aggressive systems engineering approach
CPS resilience
Systems Engineering Research Center
system assurance
resilient IoT systems
resilient cyber-physical systems design
physical control
functional design methods
formal design methods
exploitable vulnerabilities
Defense Advanced Research Process Agency
computational systems
comprehensive systems engineering approach
design
Internet of Things devices
resilience
cyber physical systems
systems engineering
software engineering
pubcrawl
Resiliency
cyber-physical systems
Internet of Things
security of data
security
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
grid stability
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
open systems
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
Permissioned Blockchains
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
data privacy
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
« first
‹ previous
…
51
52
53
54
55
56
57
58
59
…
next ›
last »