Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 11:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
biblio
Genoma: Distributed Provenance as a Service for IoT-based Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
cloud
provenance-as-a-service
Production facilities
IoT-based systems
genomics
Genoma
edge
distributed provenance
distributed IoT provenance
data processing substrate
Data processing
data management
Substrates
IoT
data provenance
Provenance
bioinformatics
Metrics
composability
pubcrawl
Human behavior
Resiliency
Data models
Internet of Things
Cloud Computing
biblio
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
sandboxing
mitigation method
MicroGuard
microcontrollers
Internet of Things devices
Data protection
component-level sandboxing
bare-metal microcontrollers
bare-metal micro controllers
automated code randomization
Internet of Things
source code (software)
code randomization
code-reuse attacks
composability
IoT devices
policy-based governance
pubcrawl
collaboration
security of data
biblio
SandBoxer: A Self-Contained Sensor Architecture for Sandboxing the Industrial Internet of Things
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
Internet of Things
collaboration
pubcrawl
policy-based governance
composability
sandboxing
catalysis
computerised instrumentation
EPROM
IIoT system architecture
industrial Internet-of-Things
SandBoxer
self-contained sensor architecture
sensor-hosted EEPROM
sensors
biblio
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
IoT firmware kernel greybox fuzzer
vulnerabilities discovery
static binary analysis.
security of data
Router Systems Security
resilience
real-world Linux-based IoT programs
program diagnostics
Metrics
Linux-based IoT program
Linux
IoT program greybox fuzzing
static analysis
Internet of Things
fuzzing
firmware
embedded security
effective vulnerability discovery technique
binary static analysis
Resiliency
composability
Human behavior
pubcrawl
biblio
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Internet of Thing devices
telecommunication network routing
system convergence performance
routing misbehavior mitigation
Router Systems Security
Resiliency
resilience
reputation calculation mechanism
pubcrawl
one-point failure risk
Metrics
malicious misbehaving routers
IoT networks
Internet of Things
Attack detection
inherent decentralized consensus mechanism
Distributed databases
distributed consensus mechanism
distributed blockchain-based RM system
decentralized database
data forwarding services
cryptocurrencies
computer network security
computer network reliability
computer network management
centralized router RM systems
blockchain-based reputation management system
blockchain technique
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
pubcrawl
Web server
untrusted networks
untrusted environments
telecommunication control
tailoring onion routing
Servers
secret supply chain procedures
Routing
Router Systems Security
resource-constrained IoT devices
resource-conserving access control
Resiliency
resilience
computer network security
Protocols
protocol incompatibilities
Metrics
IoT device owner
IoT communication
Internet of Things
Internet connectivity
end-to-end security
data privacy
Cryptography
Cryptographic Protocols
cryptographic processing
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
anticounterfeiting authentication identification code
RFIDs
UHF RFID tag
UHF RFID information security transmission technology
transmission encryption
tag information
SM7 domestic cryptographic algorithm
intelligent manufacturing
domestic cryptographic algorithm
data security protection
Cryptography
RFID technology
radiofrequency identification
information security
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
« first
‹ previous
…
68
69
70
71
72
73
74
75
76
…
next ›
last »