Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
An abstraction layer for cybersecurity context
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
Metrics
virtual services
telecommunication security
software components
security-related data
security of data
security context
security appliances
Resiliency
resilience
pubcrawl
object-oriented programming
object oriented security
cloud applications
lightweight inspection
IoT devices
Internet of Things
heterogeneous sources
flexible abstraction layer
enforcement hooks
cybersecurity context
cyber-security frameworks
cyber-attacks
composability
Cloud Computing
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
methodology
Software Architecture
Security Properties
security of data
security
Resiliency
resilience
reference architecture-based methodology
pubcrawl
operational security services
object-oriented programming
object oriented security
Metrics
architecture
ISO standards
IoT-enabled applications
IoT systems
IoT
Internet of Things
IEC standards
ERAMIS methodology
design features
computer architecture
composability
complexity
Business
biblio
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
OPC UA
unified data model
unified communication architecture
standards
Security Requirements Modeling
security requirement communication
security of data
security
SCADA Security
Resiliency
resilience
pubcrawl
production engineering computing
Production
open platform communications
OPC UA server
composability
object oriented security
Object oriented modeling
Metrics
machine-readable data model
Internet of Things
Industries
industrial IoT security requirements
industrial infrastructures
Industrial Control Systems
industrial control system security
industrial control
Germany
fourth industrial revolution
Data models
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
medical computing
security architecture analysis framework
security analysis approach
safety and security
safety analysis framework
IoT architectures
health care sensors
architecture analyses
Network Security Architecture
medical devices
medical data
Safety
health care
Smart homes
Analytical models
pubcrawl
Resiliency
computer architecture
security
Internet of Things
Medical services
security of data
biblio
The Research on IOT Security Architecture and Its Key Technologies
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
information processing
scientific information technology
IoT security architecture
information security system
information industry
economic development
Network Security Architecture
WSN
RFID
radiofrequency identification
security of data
security threats
security architecture
pubcrawl
Resiliency
information security
computer architecture
Internet of Things
technological development
« first
‹ previous
…
65
66
67
68
69
70
71
72
73
…
next ›
last »