Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IoT devices
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
arbitrary identities
authorisation
automatic trust rating
decentralized Identity
Distributed databases
Distributed Ledger Technology
DLT's network
enclosed environments
Human behavior
Identity management
identity management system
IDMS
Internet of Things
Internet of Things devices
IoT devices
IOTA Tangle
permissionless environment
proprietary environments
pubcrawl
quantifiable trust
resilience
Resiliency
Scalability
self sovereign identities
self sovereign identity
sensors
Trust framework
Trust Management Framework
trusted authority
Trusted Computing
web of trust approach
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
Access Control
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
distributed identity management model
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
Identity-of-Things (IDoT)
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
pubcrawl
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
blockchain
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
health care
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
medical information systems
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
remote patient monitoring
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
composability
computer network management
computer network performance evaluation
computer network reliability
computer network security
Computers
cryptographic algorithm
Cryptography
embedded security protection system
embedded system security protection
embedded systems
graphical management interface
Internet of Things
Internet of Things development
IoT devices
Kernel
log management
Metrics
pubcrawl
Qt graphical management interface
resilience
Resiliency
security management
security management system
security policy management
TCP/IP protocol
TCPIP
transport protocols
Trusted Computing
trusted computing technology
whitelist management
whitelist-based security protection
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
composability
computer network security
CPS
cyber security
cyber-physical systems
cybersecurity attacks
Design Space Exploration
design space exploration tools
Embedded System Design
embedded systems
Internet of Things
IoT devices
Metrics
pubcrawl
resilience
Resiliency
risk assessment
Secure Embedded Consumer Devices
Secure IoT Systems
security attack
security attackers
security constraints
security risk
security vulnerabilities
smart devices
system designers
task mappings
biblio
IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
accurate classification methods
botmaster
botnet
botnet IoT
botnet malware attacks
botnets
classification
composability
computer network security
Decision trees
false positive rate
inconspicuousness characteristics
inexpensive power
internet network security
Internet of Things
Internet of Things network infrastructure
invasive software
IoT botnet malware classification
IoT devices
learning (artificial intelligence)
machine learning
machine learning algorithms
malware
malware attack
Metrics
network traffic
packet traffic
pubcrawl
resilience
Resiliency
scikit-learn
Scikit-learn analysis tools machine learning
Scikit-learn machine learning
telecommunication traffic
Time measurement
tools
WEKA
weka tool
biblio
Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
Anomaly Detection
botnet
botnet activity
Botnet detection
botnets
CIA attacks
Classification algorithms
composability
computer network security
confidentiality integrity and availability attacks
Cybersecurity
deep learning
deep-learning classifiers
Internet of Things
invasive software
IoT Botnets
IoT devices
IoT network dataset
IoT network traffic
IoT training datasets
learning (artificial intelligence)
machine learning
Measurement
Metrics
Neural networks
performance evaluation
probability
pubcrawl
resilience
Resiliency
Smart homes
supervised machine learning
telecommunication traffic
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
biometric encryption
Big Data
biometrics (access control)
data privacy
encryption
face recognition
facial recognition
facial recognition techniques
facial recognition time
feature extraction
Internet of Things
IoT devices
Metrics
neural network
personal data
process control
pubcrawl
Resiliency
Scalability
security of data
Software
Software Architecture
software architecture proposal
Software measurement
Systematics
Transportation
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
Internet of Things
feature extraction
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
IoT devices
internet
Computer crime
Entropy
composability
real-time systems
Protocols
SDN
software defined networking
Switches
computer networks
DDoS attack detection
software-defined networking
categorized partial-flows
DDoS attack detection capabilities
OpenFlow
openflowbased switch capabilities
packet count entropies
Partial flow
real-time entropy features
SDN technology
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
Internet of Things
security
data analysis
Monitoring
IoT
pubcrawl
Metrics
resilience
Resiliency
computer network security
IoT devices
data privacy
telecommunication traffic
composability
network traffic
Reliability
security controls
testing
Google
dynamic analysis
Amazon Echo
security testing
Amazon devices
dynamic analysis security testing infrastructure
Google devices
Google Home
live traffic monitoring
offline data analysis
software analysis
dynamic networks
1
2
3
4
5
6
7
8
9
next ›
last »