Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
security forums
learning (artificial intelligence)
machine learning
machine learning-based crawler
Monitoring
Open Source Software
open-source tools
pubcrawl
security
language models
security Web sites
service-oriented architecture
social networking (online)
social web
statistical language modelling techniques
Task Analysis
telecommunication security
tools
hacker forums
crawler architecture
Crawlers
crawling architecture
cyber security
cyber threat intelligence
cyber-security information
dark web
data harvesting
Computer crime
harvested information
Human behavior
Human Factors
information gathering task
Internet of Things
IoT
IoT-related cyber-threat intelligence
biblio
Threat Extraction in IoT-Based Systems Focusing on Smart Cities
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
smart cities
waste management
threat root causes
threat instances
threat extraction
smart city scenario
IoT-based system
IoT-based services
e-health system
distinct threat types
car parking
Smart City
complex systems
Privacy Threats
security
cryptology
medical information systems
Security analysis
threat extraction method
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Internet of Things
Scalability
computer network security
Threat Modeling
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
smart surveillance
privacy
privacy protection
pubcrawl
real-time video analytics
resilience
Resiliency
Scalability
secure privacy-preserving solution
policy-based enforcement
surveillance cameras
Transforms
video access sanctioning
video signal processing
video surveillance
video surveillance system security
VSS security
edge devices
blockchain technologies
Cryptography
data privacy
Data protection
Deterrence
Distributed databases
edge detection
edge device
blockchain security
federated blockchain network
Human behavior
Internet of Things
Lib-Pri system transforms
lightweight blockchain
lightweight privacy-preserving solution
Off-Site Storage
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Deep Visual Privacy Preserving for Internet of Robotic Things
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
surveillance cameras
robot vision
robots
Scalability
security of data
service robotic platforms
Service robots
smart city applications
smart city surveillance
Smart Vehicles
Resiliency
video data base
video surveillance
visual data
visual information collection
visual privacy preserving
visualization
Web of Robotic Things
WoRT
IoRT
data privacy
Data sharing and distribution
Deep Neural Network
deep video
image segmentation
information security
Internet of Robotic things
Internet of Things
automobiles
legal access level
legal applications
Metrics
neural nets
privacy
privacy preserving
pubcrawl
resilience
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Metrics
DDoS attack detection
resource IoT devices
machine learning based detection
machine learning (ML)
distributed denial of service attacks
Distributed Denial of Service (DDoS) attack
denial of service (dos)
comprehensive detection method
common malicious attacks
IoT networks
DDoS Defense
Object recognition
machine learning
Computer crime
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Support vector machines
performance evaluation
Internet of Things (IoT)
Internet of Things
computer network security
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
Dynamic Mulitiple Agent Based IoT Security Management System
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT security
strong security
security related resources
security functions
security
Resiliency
pubcrawl
multiple security protocol compatibility
multi-agent
Metrics
IoT system
IoT security management system
applications security requirements
IoT devices
IoT
Internet of Things
efficient energy management
dynamic security agent management framework
dynamic mulitiple agent
Dymatic mangagement
cyber-physical systems
computer network security
composability
« first
‹ previous
…
60
61
62
63
64
65
66
67
68
…
next ›
last »