Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Internet of Things devices
biblio
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement
Submitted by
aekwall
on Mon, 11/11/2019 - 10:48am
Cloud Computing
Compliance
computer science
data privacy
GDPR
Human behavior
Informatics
Internet of Things
Internet of Things devices
IoT devices
IoT manufacturers
IoT policy
IoT privacy policy
IoT privacy policy agreement
mobile computing
policy test bed
privacy
Privacy Policies
privacy policy agreement
pubcrawl
Scalability
security
security of data
smart phone
smart phones
test bed
test equipment
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by
grigby1
on Wed, 10/30/2019 - 9:52am
computer network security
DNS
DNSsec
DNSSEC-signed IPv6 reverse zones
integrated circuits
internet
Internet of Things
Internet of Things devices
Internet-connected devices
internet-wide scans
IP networks
IPv4 hosts
IPv6
IPv6 address space
IPv6 hosts
large-scale security scans
Licenses
Network reconnaissance
network scanning
principal component analysis
privacy
pubcrawl
resilience
Resiliency
Revere DNS (rDNS)
RNA
Scalability
security
Security by Default
sensitive data exposure
unintended IPv6 connectivity
ZMap
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by
grigby1
on Fri, 02/08/2019 - 3:35pm
Cloud Computing
Internet of Things
resilience
pubcrawl
Resiliency
composability
computer architecture
edge computing
Peer-to-peer computing
Trusted Computing
blockchain
IoT devices
cyber physical systems
open systems
accountability
blockchain container based architecture
business network
cloud resources
container based edge computing
Containers
context dependent data analysis
data analysis
decentralized interaction model
EC infrastructures
Internet of Things devices
IoT based applications
permissioned blockchain
Provenance
smart contracts
Stakeholders
trustworthy orchestration
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
Trustworthy Systems