Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Wearable Device
biblio
Human EMF Exposure in Wearable Networks for Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
antenna design approaches
antenna radiation patterns
average specific absorption rate
biological effects of microwaves
biomedical communication
electromagnetic field exposure effect
electromagnetic fields
Electromagnetics
frequency 2.4 GHz
frequency 60.0 GHz
Guidelines
human electromagnetic field exposure effect
human EMF exposure
Human Factors
human skin surface
Internet of battlefield things
Internet of Things
iobt
military communication
On-body network
on-body wearable communications
on-body wearable devices
pubcrawl
Safety
SAR
Scalability
Skin
Specific absorption rate
UHF antennas
wearable antennas
Wearable Device
wearable networks
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
Scalability
authorisation
authorization
Data models
Resiliency
Human behavior
pubcrawl
privacy
Cameras
data privacy
ubiquitous computing
access control mechanisms
Context modeling
Wearable Device
Blood pressure
Context-aware Access
context-aware access control models
contextual condition
Continuous Authorization
continuous authorization framework
data resources
data sharing
personal context
personal data
policy model
shared data
specified context condition
subject-driven data sharing
wearables security
biblio
Password Guessing Using Machine Learning on Wearables
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
accelerometer
Accelerometers
Bluetooth
GPS
health context
Human behavior
IoT
learning (artificial intelligence)
machine learning
machine learning algorithms
password guessing
privacy
pubcrawl
raw data
Resiliency
Scalability
security
security of data
security purposes
sensitive data
ubiquitous items
wearable computers
Wearable Device
wearables
wearables security
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
data privacy
Device-Connect-Manage
health care
healthcare industry
Human behavior
Human Factors
immune information security
Immune system
Industries
information security
internet of medical things
Internet of Things
IoMT
IoT
layered-security
layered-security model
medical field
Medical services
Metrics
privacy
pubcrawl
Resiliency
Scalability
security mechanisms
security of data
security threats
Ubiquitous Computing Security
Wearable Device
wearables security
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
proxy
authentication
pubcrawl
Human behavior
Resiliency
Scalability
Protocols
telecommunication security
message authentication
performance evaluation
Cryptographic Protocols
Cryptography
Servers
authorisation
transport protocols
Wearable Device
application server
authentication protocol
Data collection
handshake protocol
mobile authentication proxy
Prototypes
secure data transmission
sensitive data
session key
TLS handshake protocol
transport layer security handshake protocol
unauthorized wearable devices
wearables security
biblio
Inferring Mobile Payment Passcodes Leveraging Wearable Devices
Submitted by grigby1 on Wed, 01/16/2019 - 1:30pm
pubcrawl
Human behavior
Resiliency
Scalability
mobile payment passcode inference
passcode input scenarios
Wearable Device
wearables security
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
AES
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
full-fledged security algorithm
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
network threats
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
telecommunication security
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
biblio
A Virtual Local-hub Solution with Function Module Sharing for Wearable Devices
Submitted by grigby1 on Thu, 05/18/2017 - 2:02pm
collaboration
composability
edge computing
Fog computing
Human behavior
local-hub
Metrics
pubcrawl
Resiliency
Scalability
Virtualization
Wearable Device
biblio
Identify Visual Human Signature in community via wearable camera
Submitted by grigby1 on Wed, 03/08/2017 - 1:14pm
Cameras
Clothing
clothing attributes
Communities
Databases
Face
facial appearance
facial attributes
feature extraction
Human Attributes
image recognition
information sharing
MCID
multiview celebrity identity dataset
pubcrawl170113
Robustness
security of data
sensor fusion
VHS recognition
visual human signature
visual patches
visualization
wearable camera
wearable computers
Wearable Device
Wearable devices
Weighted Voting
weighted voting fusion