Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internetworking
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 12:37pm
computer network security
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
Libraries
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
content transfer
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
multihop scenarios
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
security
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
computerised monitoring
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
remote monitoring
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
MVP mode
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
biblio
Experimenting with Real Application-specific QoS Guarantees in a Large-scale RINA Demonstrator
Submitted by aekwall on Tue, 09/08/2020 - 9:16am
Servers
telecommunication traffic
computer architecture
Resiliency
Human behavior
pubcrawl
Metrics
5G mobile communication
delays
quality of service
QoS
internetworking
Streaming media
video streaming
Metropolitan area networks
telecommunication scheduling
37-node 5G metro RINA network scenario
37-node 5G regional RINA network scenario
accepted candidate scheduling policy
actual quality of service guarantees
application-specific QoS guarantees
clean-slate recursive internetwork architecture
diverse QoS requirements
effective QoS support
end-user
ERASER disclose
experienced QoS metrics end-to-end
Fed4FIRE + medium experiment ERASER
HD video streaming demonstration
heterogeneous applications
large-scale experimentation
large-scale RINA demonstrator
network load conditions
perceived quality of experience
QTA-Mux
quality of experience
RINA
synthetic application traffic
t network locations
video streaming sessions
video traffic
virtual wall experimentation facility
clean slate
policy governance
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
security
IoT
computer network security
Scalability
ciphertext-policy attribute-based encryption
Access Control
authorisation
authorization
Cryptography
attribute-based encryption
Internet of Things
IoT devices
data encryption
Human behavior
pubcrawl
policy-based governance
authentication
Logic gates
middleware
internetworking
data handling
IoT middleware
attribute based access control
device data
IoT gateway
IoT system architecture
middleware layer
typical IoT system model
user access control
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
Cryptography
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
cyber-attacks
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
Internet of Things
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Resiliency
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
security of data
Cloud Computing
data privacy
security
Resiliency
pubcrawl
Metrics
cyber-attacks
collaboration
Logic gates
Scalability
application program interfaces
internetworking
Portals
data sources
information management
network threats
data sharing
API Gateway
attack prediction
C3ISP Framework
collaborative analysis
Collaborative sharing
Confidential Information Sharing and Analysis for Cyber Protection
CTI data
Cyber Threat Information
cyber threat management
privacy exposure
privacy preserving
privacy-preserving means
privacy-preserving Sharing
user privacy in the cloud
biblio
A Design of Digital Signature Mechanism in NDN-IP Gateway
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
computer network security
IP networks
Scalability
security
Resiliency
pubcrawl
internet
digital signatures
internetworking
NDN
named data networking
digital signature
Internet architecture
data authenticity
data naming
digital signature mechanism
digital signature processing
gateway
IP addresses
IP-based network
NDN-based network implementation
NDN-IP Custom-Router Gateway
NDN-IP gateway
NDN-TCP/IP
TCP/IP technology
biblio
Intelligent Architecture and Hybrid Model of Ground and Launch System for Advanced Launch Site
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
advanced launch site system
aerospace control
Application Layer
architectural framework
automatic control system crossing
Cloud Computing
command and control systems
composability
data processing system
flight payloads
intelligent analysis assessment system
intelligent architecture
intelligent command
intelligent control
intelligent elements
intelligent flight
intelligent functional architecture
intelligent launching region
intelligent system model
intelligent technical area
Internet of Things
internetworking
landing area
launch processes
launch system
launch systems
launch vehicle
middleware
middleware security
network layer
perception layer
Physical layer
physical objects
policy-based governance
pubcrawl
resilience
Resiliency
security of data
sensors
Space vehicles
test operation
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 10:42am
Pervasive Computing Security
Base stations
Ciphers
composability
Computers
contemporary cryptographic mechanisms
distributed sensor nodes
filtering theory
Internet of Things
internetworking
Intrusion Detection Systems
lightweight quantum-safe security concept
Predictive Metrics
pubcrawl
quantum computers
quantum computing
quantum computing security
quantum cryptography
Resiliency
resource-aware security
Scalability
security of data
stage permeated filtering mechanism
telecommunication security
tiny sensor nodes
ubiquitous internetworking
Wireless Sensor network communication
wireless sensor networks
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
computer network security
Internet of Things
Protocols
Software
transport protocols
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
internet
authentication
sensor security
sensors
internetworking
protocol
sensor networks
queueing theory
data
certificate-based authentication
data transmission protocols
device authentication protection
gateways
Message Queue Telemetry Transport protocol
messages
network servers
protecting devices
publisher-subscriber architecture
radiotelemetry
secure IoT-solution mechanisms
1
2
3
next ›
last »