Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart Home
biblio
A Security Architecture for Networked Internet of Things Devices
Submitted by grigby1 on Mon, 06/11/2018 - 3:26pm
networked IoT devices
wireless sensor networks
smart transportation
smart services
Smart homes
Smart Home
Smart Grid
security services
security of data
Resiliency
resilience
pubcrawl
power supply
NoTs
NoT network cluster
advanced cryptographic solutions
network-level security controllers
network resource management
network intrusion detection system
Monitoring
Metrics
IoT security architecture
IoT demand
Internet of Things
internet
Cryptography
computer network security
computer architecture
composability
auditing module
biblio
Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module
Submitted by grigby1 on Thu, 05/24/2018 - 12:25pm
active data bundles
Cloud Computing
Fog computing
Human behavior
Internet of Things
Policy
privacy
Privacy Policies
pubcrawl
real-time processing
Scalability
sensitive data
Smart Home
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
profile
Debraj De
Information Technology Sector
Automotive
3-D Printing
Medical Devices
Networked Control
Water and Wastewater Systems Sector
Transportation Systems Sector
Healthcare and Public Health Sector
Financial Services Sector
Emergency Services Sector
Commercial Facilities Sector
Energy Efficient Buildings
Smart Grid
Ground Vehicles
Consumer
Communication
Embedded Software
Real-time Systems
Platforms
Time Synchronization
Control
Modeling
Systems Engineering
Wireless Sensing and Actuation
Real-Time Coordination
Resilient Systems
Health Care
Science of System Integration
Robotics
Transportation
Education
Science Policy
Research Program Overview
Internet of Things
Smart Environments
Smart Home
Smart City
Wearable
pervasive computing
« first
‹ previous
1
2
3
4