Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
protocol
biblio
Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
advantage
CoAP
composability
different IoT protocols
Embedded System
embedded systems
Esp32
Hardware
hardware stage
HTTP
Internet of Things
IoT
IoT protocol
Metrics
MQTT
popular IoT protocols
Power demand
protocol
Protocols
pubcrawl
resilience
Resiliency
security
Software
transport protocols
XMPP
XMPP IoT communication protocols
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
Intrusion Detection
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
sensors
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
Transmission line measurements
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
radar detection
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
Servers
Cryptographic Protocols
information security
pubcrawl
Cryptography
Vulnerability
message authentication
authentication
Fingerprint recognition
Phishing
Human Factors
protocol
cryptographic algorithms
electronic commerce
Authentication Protocols
two-factor authentication
two factor authentication
complicated protocols
e-commerce
information technologies
one-time password
one-time passwords
relatively old Lamport's hash-chain protocol
Resistance
reviewed protocols
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
computer network security
Internet of Things
Protocols
Software
transport protocols
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
internet
authentication
sensor security
sensors
internetworking
protocol
sensor networks
queueing theory
data
certificate-based authentication
data transmission protocols
device authentication protection
gateways
Message Queue Telemetry Transport protocol
messages
network servers
protecting devices
publisher-subscriber architecture
radiotelemetry
secure IoT-solution mechanisms
biblio
Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
.NET core cloud structure
cloud
Cloud Computing
Cryptography
Embedded System
embedded systems
encrypted communication
Esp32 IoT embedded system
Esp32 Wrover
Human behavior
Human Factors
humidity sensors
Internet of Things
IoT
IoT Cloud
IoT device
JSON type data format
Metrics
microprocessor chips
MQTTS
MQTTS protocol
protocol
Protocols
pubcrawl
resilience
Resiliency
Scalability
secure communication
SSL Trust Models
SSL/TLS certificate
Temperature sensors
TLS/SSL
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
Base stations
collaboration
Communication system security
composability
computer network security
Handheld computers
IP networks
IPv4 MANET
IPv6 MANET
ipv6 security
IPV6 systems
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
Mobile impromptu systems
pervasive computing
policy-based governance
protocol
pubcrawl
resilience
Resiliency
self arranging system
steering conventions
TCP-IP
Technological innovation
telecommunication traffic
transport protocols
Wireless communication
wireless gadget connections
biblio
A Cryptographic Look at Multi-party Channels
Submitted by aekwall on Mon, 09/23/2019 - 10:26am
computer network security
Servers
encryption
Cryptographic Protocols
Protocols
provable security
Resiliency
pubcrawl
internet
Reliability
Predictive Metrics
-broadcast-communication
-causality-preservation
-confidentiality
-integrity
authenticated communication
authenticated encryption
bidirectional channel
bidirectional communication
broadcast channels
broadcast communication
channel security
confidential communication
cryptographic channels
FSE17-ToSC17
full-fledged broadcast channel
game-based authenticity
Group communication
multiparty channels
point-to-point link
point-to-point links
protocol
secure-channels
Security Properties
standard cryptographic primitives
unidirectional links
Compositionality
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
authentication
Cloud Computing
Cloud Security
Cryptographic Protocols
ECC
Elliptic curve cryptography
high security
Human behavior
Kerberos
Kerberos authentication protocol
Metrics
protocol
protocol models
Protocols
pubcrawl
public key cryptography
Resiliency
RSA
RSA cryptography
securities issues
security of data
security protocols
Servers
telecommunication security
threshold
threshold cryptography
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
AODV
attack mitigation
black-hole attack mitigation techniques
Blackhole
byzantine attacks
clustering
Compositionality
Conferences
cross checking
data packets
delays
destination nodes
high destination sequence number
IDS
MANET
Metrics
mobile ad hoc networks
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
Resiliency
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
1
2
3
4
next ›
last »