Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance evaluation
biblio
Remote Attestation as a Service for Edge-Enabled IoT
Submitted by aekwall on Tue, 01/25/2022 - 2:49pm
Prototypes
Trusted Platform Module (TPM)
Smart healthcare
Remote Attestation
edge devices
data centers
Constrained Devices
attestation
Costs
Image edge detection
composability
Human behavior
Resiliency
pubcrawl
edge computing
Internet of Things (IoT)
performance evaluation
Cloud Computing
biblio
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices
Submitted by aekwall on Tue, 01/25/2022 - 2:49pm
Hardware
privacy
Internet of Things
performance evaluation
Trusted Computing
pubcrawl
Resiliency
Human behavior
composability
cyber-physical systems
attestation
Device-to-device communication
microcontrollers
Remote Attestation
RISC V
biblio
A Security Integrated Attestation Scheme for Embedded Devices
Submitted by aekwall on Tue, 01/25/2022 - 2:49pm
performance evaluation
Time measurement
Swarm Intelligence
swarm attestation
security
Resiliency
reputation mechanism
Remote Attestation
pubcrawl
attestation
IoT security
Internet of Things
Human behavior
energy measurement
energy consumption
embedded devices
Conferences
composability
biblio
IoT Standard Platform Architecture That Provides Defense against DDoS Attacks
Submitted by grigby1 on Tue, 01/11/2022 - 9:35am
OCF
zero trust
Time measurement
Scalability
Resiliency
resilience
pubcrawl
Protocols
performance evaluation
attack surface
Metrics
Limiting
IoT security
IoT network security
denial-of-service attack
DDoS Attack
Conferences
Computer hacking
biblio
Secure Storage of Data on Devices-Android Based
Submitted by grigby1 on Mon, 01/10/2022 - 11:16am
OTP key
tools
Steganography
scientific computing
Scalability
Resiliency
resilience
pubcrawl
Prediction algorithms
performance evaluation
android encryption
Metrics
information management
Human behavior
encryption
DNA coding
DNA
decryption
Android security
biblio
Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
mobile ad hoc networks
vehicular networks
V2V communications
Routing protocols
Routing
Resiliency
Reliability
pubcrawl
performance evaluation
Ad Hoc Network Security
Metrics
Conferences
computer network reliability
Compositionality
communication protocols
cognitive radio ad-hoc networks
Ad hoc networks
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 12:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery
Submitted by aekwall on Mon, 11/29/2021 - 12:54pm
6LoWPAN
composability
Control Message Overhead
Cooja Simulator
electromagnetic interference
energy consumption
Internet of Things
Internet of Things Routing Protocol
packet delivery ratio
performance evaluation
pubcrawl
Resiliency
Routing protocols
standards
traffic control
biblio
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
Submitted by aekwall on Mon, 11/08/2021 - 2:22pm
cyber threat
Measurement
threat vectors
unsolicited e-mail
spam classification
performance evaluation
Machine Learning Application
Cyberspace
Cybercrime
Support vector machines
intrusion detection system
Decision trees
malware detection
malware
machine learning
privacy
pubcrawl
Computer crime
biblio
Device Selection Decision Making using Multi-Criteria for Offloading Application Mobile Codes
Submitted by aekwall on Mon, 10/04/2021 - 1:07pm
Resiliency
Pervasive Computing Security
Portable computers
Mobile handsets
fuzzy TOPSIS
device selection
application partitioning
analytic hierarchy process
AHP
security
Metrics
Scalability
pubcrawl
pervasive computing
performance evaluation
Bandwidth
Human Factors
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »