Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
IoT Security in Wireless Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Internet of Things
wireless sensor networks
wireless devices
Wireless communication
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
IoT security
IoT
Internet of Things framework
Communication system security
internet
interconnected devices
Human Factors
Human behavior
encryption
Elliptic curve cryptography
ECC (elliptic curve cryptography)
ECC
Conferences
computer network security
composability
biblio
A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Privacy.
Trusted Computing
trust model
trust computation
trust
telecommunication security
similarity model
similarity
sensors
security
Resiliency
resilience
Reliability
Recommendations
pubcrawl
Cloud Computing
mitigate badmouthing attacks
Metrics
malicious object
IoT security
IoT networks
IoT
Internet of Things
Human Factors
Human behavior
Data models
Computational modeling
composability
Collusion Attacks
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
queueing theory
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
Metrics
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
Human behavior
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
ciphertext-policy attribute based encryption
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware
Submitted by grigby1 on Thu, 07/30/2020 - 2:14pm
IoT devices
security
secure IoT system
REST API
Resiliency
resilience
representational state transfer API
pubcrawl
middleware
Metrics
Logic gates
IoT systems
IoT security
application program interfaces
IoT applications
IoT
Internet of Things
Human Factors
Human behavior
fairly disruptive technology
data privacy
computer network security
composability
Cloud Computing
authorization
authentication
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
Protective relaying
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
CIT algorithm
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
security of data
Abnormal data diagnose
open network environment
Integrated circuit modeling
Numerical models
sensors
power engineering computing
Substations
data analysis
smart phones
composability
pubcrawl
Resiliency
real-time systems
telecommunication security
Internet of Things
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
…
next ›
last »