Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Performance Modeling and Assessment of Unified Video Surveillance System Based on Ubiquitous SG-eIoT
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
Fog computing
video terminals
unified video surveillance system
ubiquitous SG-eIoT
service latency parameters
service latency
Performance modeling
network load
electric Internet of Things(eIoT)
edge eIoT agent
video surveillance
Streaming media
Cloud Computing
Logic gates
Cameras
video signal processing
edge computing
delays
Metrics
pubcrawl
Human behavior
Resiliency
power aware computing
Internet of Things
biblio
Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
contracts
Trustworthy Systems
trustworthy IoT assurance evaluation
trustworthy evidence collection
smart IoT systems clash
service-based methodology
mobile end users
hyperledger fabric blockchain
cloud-based applications
Assurance Evaluation
secure environment
cyber physical systems
interconnected devices
IoT
smart contracts
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
Internet of Things
Cloud Computing
biblio
Trustworthy Management in Decentralized IoT Application using Blockchain
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
IoT system
Trustworthy Systems
trustworthy management
Trust management
trust issue
supply chain system
Smart City
smart car
security
Resiliency
pubcrawl
privacy issues
privacy
IoT technology
associated users
IoT
Internet of Things
human living standard
ethereum
decentralized IoT application
data privacy
data modification
cyber physical systems
current centralized system
composability
blockchain technology
Blockchain implementation
blockchain
biblio
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
software-defined networking
Service efficiency problems
routing security policy verification
interconnected devices
security policy
security policies
IoT network
quality of service
delays
network traffic
Monitoring
telecommunication network routing
Routing
policy-based governance
pubcrawl
security
Runtime
telecommunication security
Internet of Things
telecommunication traffic
biblio
Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
Submitted by aekwall on Mon, 04/13/2020 - 10:07am
Local area networks
Security by Default
Software Defined Perimeter
SD-WAN
SD-Node
machine-to-machine communications
machine-to-machine communication
M2M devices
industrial Internet of Things for Critical Infrastructure
industrial application
IIoT-CI
wide area networks
Software Defined Networks
computer network security
SDN
risk management
pubcrawl
Resiliency
critical infrastructure
software defined networking
Software
Protocols
security
Internet of Things
Scalability
ddos mitigation
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:05am
security
Monitoring
Scalability
Internet of Things
Protocols
Resiliency
pubcrawl
Fans
CPS
Network
Heating systems
iiot
Security by Default
biblio
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
nearest neighbour methods
healthguard
implantable medical devices
Internet-of-Things
k-nearest neighbor
machine learning-based detection techniques
machine learning-based security framework
malicious activities detection
malicious threats
medical emergency
Healthcare
patient monitoring
pervasive computing
Random Forest
SHS
Smart Healthcare System
smart healthcare systems
smart medical devices
Pervasive Computing Security
Human Factors
resilience
security
computer network security
Scalability
internet
health care
medical information systems
pubcrawl
Metrics
Resiliency
Internet of Things
Human behavior
random forests
neural nets
Anomaly Detection
artificial neural network
critical medical conditions
Decision Tree
Decision trees
diseases
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
…
next ›
last »