Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
bluetooth low energy
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by
grigby1
on Mon, 12/28/2020 - 11:29am
Cryptography
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
Application Layer
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
BLE Security Scan framework
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by
grigby1
on Mon, 12/28/2020 - 11:28am
address randomization
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
BT spectrum analysis
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
high data rates
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
resilience
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
biblio
SharaBLE: A Software Framework for Shared Usage of BLE Devices over the Internet
Submitted by
grigby1
on Tue, 12/01/2020 - 3:38pm
application program interfaces
BLE-equipped device
Bluetooth
bluetooth low energy
Cloud Computing
cloud-based software framework
collaboration
composability
computer network reliability
energy consumption
generic service stack
Human behavior
Human Factors
internet
Internet of Things
Internet-scale Computing Security
Logic gates
Metrics
Policy Based Governance
pubcrawl
remote BLE IoT devices
resilience
Resiliency
RESTful API
Scalability
Servers
short communication range
Software
wireless communication technologies
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by
grigby1
on Fri, 09/04/2020 - 3:26pm
security
Protocols
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
cyber physical systems
low power consumption
Bluetooth
ad-hoc networking technologies
BLE
BLE mesh network security mechanisms
BLE security protocols
bluetooth low energy
Bluetooth low energy mesh network technology
Communication networks
MESH network
mesh support capability
wireless
Wireless Mesh Network Security
wireless mesh networks
WMN
Cyber Physical System
bluetooth security
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by
grigby1
on Fri, 09/04/2020 - 3:26pm
encryption
Internet of Things
security
security of data
Protocols
Hardware
standards
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT
sensitive information
Software
cyber physical systems
security standards
Internet of Things devices
Bluetooth
BLE devices
bluetooth low energy
malicious actors
Ubertooth
Cyber Physical System
bluetooth security
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by
grigby1
on Fri, 04/03/2020 - 11:32am
Internet of Things
privacy
Bluetooth
pubcrawl
Human behavior
telecommunication security
data privacy
Scalability
Privacy Policy
smart phones
telecommunication computing
telecommunication network management
advertising
beacon privacy manager
BLE Beacon Privacy management
BLE Beacons
BLE signals
bluetooth low energy
bluetooth low energy beacon
policy configuration platform
Policy Management
proof-of-concept app
Receivers
trustworthy privacy management
User behavior
user experience
user-driven privacy policy configuration
Privacy Policies
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by
aekwall
on Mon, 01/20/2020 - 10:46am
BLE
BLE expandability problem
BLE mesh
BLE static constrained-resources networks
Bluetooth
bluetooth low energy
Bluetooth low energy networks
complex systems
composability
constrained-resource nodes
energy conservation
energy consumption profile
energy dissipation
Energy Efficiency
energy efficient tree algorithm
expandability
fast growing protocol
IoT
multihop BLE networks
multihop routing
network lifetime
Protocols
pubcrawl
Resiliency
resource-constrained devices
telecommunication network reliability
telecommunication power management
tree network
ultralow energy consumption
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by
grigby1
on Wed, 10/30/2019 - 9:53am
Access Control
authorisation
Bark phrases access control policies
Bluetooth
bluetooth low energy
Cloud Computing
Computer crime
default-off networking
internet
Internet of Things
IoT application protocols
IoT device communications
IoT networks
Logic gates
minimal access permissions
network security
policy language
pubcrawl
resilience
Resiliency
Scalability
Security by Default
Servers
smart devices
smart lock
Web browser
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by
aekwall
on Mon, 08/05/2019 - 9:34am
Amazon Echo
Amazon Echo enabled IoT home security system
BLE
Bluetooth
Bluetooth 4
bluetooth low energy
Cameras
composability
computer network security
expandability
file servers
Flowcharts
home automation
home computing
Home Security System
internet
Internet accessible configuration page
Internet of Things
Internet-connected system
IoT
pubcrawl
Resiliency
sensors
Smart Home
smart home environment
Speech recognition
ultralow-power wireless sensor network
user voice commands
Web server
wireless sensor networks
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by
aekwall
on Mon, 04/01/2019 - 9:06am
computer network security
encryption
Protocols
mobile computing
feature extraction
Resiliency
Human behavior
pubcrawl
composability
smart phones
Data mining
Bluetooth
Bluetooth devices
Bluetooth LE connection
Bluetooth LE devices
Bluetooth LE security
bluetooth low energy
Bluetooth Smart
Bluetooth special interest group
Frontline BPA Low Energy Analyzer
bluetooth security
1
2
next ›
last »