Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
Scalability
Internet of Things
message authentication
mobile radio
privacy
pubcrawl
Public key
resilience
Resiliency
identity-based broadcast signcryption
telecommunication control
ubiquitous computing
ubiquitous healthcare system
WBAN
Wireless body area networks
Wireless communication
Wireless communications
context-aware access control
adaptive access control scheme
adaptive contextual privacy
anonymous authentication approach
anonymous messaging
authentication
authorisation
body area networks
ciphertext authenticity
Access Control
context-aware authorization
context-aware privacy
Cryptography
data privacy
health care
healthcare services
hybrid certificateless signcryption
biblio
Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
human computer interaction
word recognition procedure
ubiquitous computing
smartphone sensing
smartphone microphone
smart phones
sensors
Semantics
semantic features
Resiliency
pubcrawl
microphones
keystroke sensing
Keyboards
human computer operation recognition
human computer operation
acoustic features
Human behavior
Games
fingerprint identification techniques
fingerprint identification
Feature fusion
feature extraction
determined keystrokes
Context-aware services
computer keyboard
composability
classification model
Activity Recognition
Acoustics
Acoustic Fingerprints
biblio
Context Aware Ubiquitous Biometrics in Edge of Military Things
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
operational context data collection
Internet of Things
iobt
IoMT
message authentication
military computing
military equipment
military personnel
military-battlefield applications
internet of military/battlefield things
pubcrawl
resilience
Resiliency
Scalability
soldier psychophysical condition continuous monitoring
static biometrics
ubiquitous computing
ubiquitous sensing
context-adaptive authentication
battlefield-level biometric monitoring
biometrics (access control)
Cloud Computing
computer architecture
computing devices
Conferences
context aware biometrics
context aware ubiquitous biometrics
authentication
Context-aware services
dedicated edge computing architecture
distributed processing
dynamic biometrics
edge of military things
Human Factors
Internet of battlefield things
Internet of military Things
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
Resiliency
WiFi
ubiquitous computing
Service robots
security threats
security risk assessment
security of data
security access
security
robots
robotic systems
Robot sensing systems
risk management
collision avoidance
resilience
remote accessing
remote access service
pubcrawl
PeopleBot mobile robot research platform
mobile robots
mobile robot platform
internet
Ethernet
Damage Assessment
critical missions
control
biblio
Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
mobile ad hoc networking
ubiquitous computing
telecommunication network routing
Sybil attack
routing table
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
attack mitigation
mobile ad hoc network
mitigation techniques
military search operations
military rescue operations
Metrics
Market research
MANET
Compositionality
civilian environment
attacks techniques
attacks in manet
biblio
An authorized security middleware for managing on demand infrastructure in cloud
Submitted by grigby1 on Mon, 06/11/2018 - 2:45pm
On-demand security
cloud demand infrastructure management
cloud stack
Dual authorization
Dual-Authorization
Dynamic infrastructure request control
handle On-demand Infrastructure request
IaaS
on-demand request
on-demand scheduler
auto scalability feature
on-demand service request handling
rapid elasticity
secure environment
security risks
ubiquitous computing
ubiquitous network access
virtualized computing platform
VM
middleware security
tools
pubcrawl
composability
Scalability
security of data
Cloud Computing
Servers
cloud users
virtualisation
authorization
resilience
Heuristic algorithms
security issues
middleware
Resiliency
Policy
collaboration
policy-based governance
authorized security middleware
Auto scalability
biblio
Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding
Submitted by grigby1 on Mon, 06/11/2018 - 2:33pm
cache management
composability
Conferences
distributed processing
information-centric network
Iron
linear network coding
Metrics
network coding
pubcrawl
resilience
Resiliency
Routing
security
ubiquitous computing
biblio
A Carpooling Recommendation System for Taxicab Services
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
reciprocal price mechanism
Urban areas
ubiquitous computing
transportation supply
Transportation
traffic engineering computing
taxicab service
Taxicab Network
recommender systems
recommendation system
CallCab
real-time systems
Public transportation
MapReduce model
GPS data sets
Global Positioning System
Dispatching
Data-driven approach
carpooling recommendation system
carpooling
1536086
biblio
Fabryq: Using Phones As Gateways to Prototype Internet of Things Applications Using Web Scripting
Submitted by el_wehby on Thu, 05/17/2018 - 5:28pm
prototyping
swarm devices
toolkits
ubiquitous computing
1505684
biblio
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
PKI Trust Models
web of trust
ubiquitous system
ubiquitous computing
Trusted Computing
Trust Management for authentication
Trust management
TM systems
Resiliency
resilience
Public key
pubcrawl
attacks and defences
Organizations
open distributed ledgers
online interactions security
ODL
interactive systems
formal modeling
Electronic mail
composability
blockchain technology
bitcoin
authentication
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »