Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT)
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT systems
Cross Layer Security
XLF
unprecedented opportunities
pervasive IoT applications
paramount threats
cross-layer framework
cross-layer approach
Cross Layer
comprehensive protection
composability
IoT
privacy
batteries
pubcrawl
Resiliency
Protocols
security
Hardware
Internet of Things
Cloud Computing
security of data
biblio
Joint PHY/MAC Layer AN-Assisted Security Scheme in SVD-Based MIMO HARQ system
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
MIMO HARQ system
cross-layer security design
data rate performance
data rates
explosive data growth
HARQ protocol
high data rate requirement
joint PHY/MAC layer AN-assisted security scheme
low data rates
artificial noise design
multiple input multiple output hybrid automatic retransmission request system
parallel subchannels
singular value decomposition
SVD
SVD-based MIMO HARQ system
transmitting antennas
Cross Layer Security
telecommunication security
composability
Automatic repeat request
MIMO communication
receiving antennas
Cross-Layer Security
fading channels
access protocols
artificial noise
wireless channels
Internet of Things
5G mobile communication
pubcrawl
Resiliency
information security
security
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by aekwall on Mon, 09/14/2020 - 12:28pm
Privacy-preserving
composability
smart IoT devices
smart Internet of Things (IoT) devices
privacy-preserving outsourced speech recognition
outsourced privacy-preserving speech recognition framework
neural network-based speech recognition
long short-term memory neural network
long short-term memory (LSTM)
intelligent IoT device voice control
human-machine interaction interface
forward propagation (FP)
Back propagation through time (BPTT)
additive secret sharing-based interactive protocols
data privacy
Speech recognition
edge computing
recurrent neural nets
Logic gates
Neural networks
Cryptography
privacy
pubcrawl
privacy leakage
Protocols
distributed processing
Internet of Things
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
« first
‹ previous
…
53
54
55
56
57
58
59
60
61
…
next ›
last »