Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Internet-of-Things
biblio
Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 12:34pm
Internet-of-Things
smart meters
smart meter
Smart Grids
Smart Grid Sensors
smart contracts
Resiliency
resilience
real-time systems
pubcrawl
machine learning
blockchains
Human Factors
Human behavior
Fog computing
Elliptic curve cryptography
digital signature
cyber-physical system
Cryptography
Computational modeling
composability
Cloud Computing
biblio
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
Submitted by grigby1 on Mon, 01/31/2022 - 3:47pm
privacy
blockchain
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Access Control
Medical services
Prototypes
Internet-of-Things
Pandemics
wearable computers
wearables security
Medical wearable devices
biblio
MAFIA: Multi-Layered Architecture For IoT-Based Authentication
Submitted by grigby1 on Thu, 09/30/2021 - 11:09am
multifactor authentication
Metrics
Internet-of-Things
Human Factors
Human behavior
face recognition
energy consumption
deployment
Complexity theory
authentication
usability
security
Resiliency
resilience
pubcrawl
privacy
biblio
An End-to-End Context Aware Anomaly Detection System
Submitted by grigby1 on Wed, 07/28/2021 - 8:48am
Anomaly Detection
Computational modeling
Computing Theory
Context-aware services
deep learning
Industries
Internet-of-Things
Metrics
Pipelines
pubcrawl
Security Metrics
Semantics
biblio
Trusted Anonymous Authentication For Vehicular Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/13/2021 - 12:07pm
Cloud Computing
security
pubcrawl
resilience
Resiliency
authentication
privacy
Databases
Forensics
Cameras
anonymous messaging
Internet-of-Things
efficiency
Trusted Anonymous Authentication
Vehicular Cyber-Physical Systems
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
Dominance as a New Trusted Computing Primitive for the Internet of Things
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
resilience
Latches
mainstream IoT devices
neural style transfer
Nucleo-L476RG
operating systems
Predictive Metrics
pubcrawl
Raspberry Pi Compute Module 3
large-scale IoT deployments
Resiliency
Scalability
security of data
sensors
separate service processors
Servers
Trusted Computing
trusted platform modules
geographical area
central entity
CIDER performance overhead
CIDER system
composability
cyber-physical system security
dominant computing paradigms
firmware
firmware image
Authenticated-Watchdog-Timer
Hardware
HummingBoard Edge
Internet of Things
Internet-of-Things
IoT
IoT hardware
IoT platforms
large-scale industrial deployments
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
Novel approach for cybersecurity workforce development: A course in secure design
Submitted by grigby1 on Wed, 11/04/2020 - 2:00pm
IoT products
visualization
visual design
User-Centered Design
user interaction design
User centered design
Training
traditional interdisciplinary approach
teaching
Smart homes
security of data
secure design
pubcrawl
privacy
password
computer aided instruction
Internet-of-Things
Internet of Things
interdisciplinary course
experiential learning
educational interventions
educational courses
cybersecurity workforce development
cybersecurity training
cybersecurity students
cybersecurity education
cybersecurity curriculum
cyber physical systems
computer science education
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
1
2
3
4
next ›
last »