Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart Home
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by grigby1 on Thu, 12/17/2020 - 1:02pm
resilience
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
mobile computing
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
Firebase realtime database
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Adafruit IO
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 10:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
pubcrawl
telecommunication security
standards
Smart homes
Smart Home
Servers
security-based solutions
security smart homes
security of data
security approach
security
Resiliency
resilience
Remote Patterns
authentication
privacy
policy-based governance
MidSecThings
middleware security
middleware
IoT middleware
IoT devices
IoT
Internet of Things
home automation
distributed security mechanisms
data privacy
composability
biblio
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
Submitted by aekwall on Mon, 05/11/2020 - 10:29am
Online banking
queuing theory simulation
Queuing theory for blockchain
M/M/n/L queuing system
leading technology
Blockchain using jsimgraph
Blockchain simulation
blockchain based systems
Bitcoin queuing simulation
network accountability
accountability
auditability
queueing theory
Queueing analysis
Resiliency
Smart Home
Data mining
social networks
internet
blockchain
Metrics
social networking (online)
Computational modeling
Peer-to-peer computing
bitcoin
composability
pubcrawl
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 10:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Listen!: Audio-based Smart IoT Device Pairing Protocol
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Scalability
Resiliency
pubcrawl
policy-based governance
IoT security
Human Factors
Smart Home
context-based pairing
zero-interaction
zero trust
« first
‹ previous
1
2
3
4
next ›
last »