Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data collection
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 3:21pm
Indexes
wireless access points
vulnerabilities
Smart Sensor
Smart Grid Sensors
Smart Grid
smart cities
Servers
Sensor Systems
security of data
Resiliency
pubcrawl
process algorithm
physical object
local real-time control activities
Intelligent sensors
Cloud Computing
Humidity
Human Factors
Human behavior
enterprise command
Data collection
cyber-physical systems
cyber security threats
cyber security
cyber physical sensors system security
cyber physical SENSOR Systems
Cryptography
CPSS threats
control center
computing platform
composability
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
Mobile Health Data Collection Systems
threat analysis
surveillance
security of data
security
Scalability
public surveillance
public healthcare
public health surveys
Public Health Surveillance Systems
pubcrawl
privacy impact assessment methodology
privacy
primary healthcare
PIA
national-level databases
comprehensive privacy threat analysis
mobile computing
mHealth data collection system
mhealth
medical computing
MDCS
Human Factors
health care
GeoHealth
expert systems
data security issues
data quality
Data protection
data privacy
Data collection
biblio
FailureSense: Detecting Sensor Failure Using Electrical Appliances in the Home
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
Monitoring
Training data
Training
telecommunication network reliability
Smart homes
sensor reliability
sensor placement
sensor firing
sensor failure detection
sensor deployment
Redundancy
Data collection
inexpensive sensors
home networks
home electrical appliances
Home appliances
fault diagnosis
failuresense
fail-stop failure
Electrical products
distributed sensors
1536086
biblio
An architecture model for smart city using Cognitive Internet of Things (CIoT)
Submitted by grigby1 on Wed, 05/16/2018 - 1:41pm
smart cities
MEMS
Protocols
pubcrawl
radio frequency identification
resilience
Resiliency
RFID
RFIDs
Servers
massive volume
Smart City
smart devices
smart features
social aspects of automation
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
Data integration
central server
centralized server
CIoT
cognitive Internet of Things
cognitive radio
communication protocol
data analysis
Data collection
architecture model
Data processing
distributed architecture
heatmap
Human behavior
human factor
Internet of Things
IoT
IoT data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »