Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Study on Security Technology of Internet of Things Based on Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
network coding
traditional network technology
Satellites
prefect information secure condition
max-flow
information secure network coding scheme
information network
eavesdropping adversaries
cyber physical systems
computer network security
encoding
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
security
Internet of Things
biblio
Adapting Users' Privacy Preferences in Smart Environments
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Internet of Things
privacy
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
data privacy
Scalability
service providers
Privacy Policies
privacy checking
Privacy Control
Privacy Preferences
smart environment
soft privacy matching mechanism
users privacy preferences
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
« first
‹ previous
…
67
68
69
70
71
72
73
74
75
…
next ›
last »