Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Smart Home
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by
aekwall
on Mon, 12/21/2020 - 12:28pm
RPL
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
mobile radio
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
Routing Protocol
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
IoT enabled smart home environment
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by
grigby1
on Thu, 12/17/2020 - 1:02pm
Adafruit IO
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Firebase realtime database
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
mobile computing
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
resilience
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
biblio
Anomaly Detection Models for Smart Home Security
Submitted by
aekwall
on Mon, 11/23/2020 - 10:28am
computer network security
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
Smart Home
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
HMM model
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by
aekwall
on Mon, 08/17/2020 - 10:18am
computer network security
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
cyber-attacks
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
DoS attack
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
graph-based outlier detection in Internet of Things
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by
aekwall
on Mon, 08/03/2020 - 9:29am
computer network security
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
pubcrawl
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
internal network
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal devices
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by
aekwall
on Mon, 06/22/2020 - 10:26am
Cloud Computing
Scalability
digital signature
Internet of Things
provable security
Resiliency
pubcrawl
digital signatures
Public key
Smart Home
Bilinear Pairing
sensors
cloud
random oracle model
BDH
designated verifier
Designated verifier signature
Electrical Engineering
ID-based signature scheme
ID-based strong designated verifier signature scheme
Intenet of Things
issued signature
produced signature
ROM
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by
aekwall
on Mon, 06/01/2020 - 9:54am
authentication
composability
data privacy
distributed security mechanisms
home automation
Internet of Things
IoT
IoT devices
IoT middleware
middleware
middleware security
MidSecThings
policy-based governance
privacy
pubcrawl
Remote Patterns
resilience
Resiliency
security
security approach
security of data
security smart homes
security-based solutions
Servers
Smart Home
Smart homes
standards
telecommunication security
biblio
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
Submitted by
aekwall
on Mon, 05/11/2020 - 10:29am
Resiliency
pubcrawl
composability
bitcoin
Peer-to-peer computing
Computational modeling
social networking (online)
Metrics
blockchain
internet
social networks
Data mining
Smart Home
Online banking
Queueing analysis
queueing theory
auditability
accountability
network accountability
Bitcoin queuing simulation
blockchain based systems
Blockchain simulation
Blockchain using jsimgraph
leading technology
M/M/n/L queuing system
Queuing theory for blockchain
queuing theory simulation
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by
aekwall
on Mon, 05/04/2020 - 10:15am
Computer crime
computer network security
Internet of Things
Protocols
computer architecture
Resiliency
pubcrawl
privacy
IoT security
Logic gates
Smart homes
reference architecture
home automation
Smart Home
security challenges
Cyber Attacks
Safe-Guarding Home IoT Environments
Network Security Architecture
architectural layers
cyber security architecture
cyber security services
disruptive software-enabled network security solutions
GHOST security framework
H2020 European research project GHOST
IoT smart home residents
IoT-based smart homes
multilayered architecture
Personalised Real-time Risk Control
re-configurable solutions
transparent cyber security environment
user-centric cyber security
user-comprehensible solution
biblio
Listen!: Audio-based Smart IoT Device Pairing Protocol
Submitted by
aekwall
on Mon, 01/20/2020 - 11:13am
Scalability
Resiliency
pubcrawl
policy-based governance
IoT security
Human Factors
Smart Home
context-based pairing
zero-interaction
zero trust
1
2
3
next ›
last »