Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
A generalized optimization framework for control plane in tactical wireless networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
optimisation
wireless networks
wireless multihop tactical networking
Transmitters
throughput maximization problem
Throughput
telecommunication control
tactical wireless networking
spread spectrum communication
seamless multihop communications
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
optimization
Ad hoc networks
network layers
multihop tactical wireless networks
military communication
Metrics
Interference
Human Factors
human factor
Human behavior
global network optimization framework
generalized optimization framework
crosslayer optimization framework
control plane
collaboration
clean slate
biblio
Named data networking testbed for scientific data
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
Policy-Governed Secure Collaboration
metadata
Meteorology
Metrics
name based symmetrical forwarding
named data networking
NDN-based climate data delivery
Pipelines
policy governance
large-scale scientific data
pubcrawl
resilience
Resiliency
scientific data named data
scientific information systems
Throughput
tools
human factor
climate science
climatology
collaboration
Containers
data handling
data intensive science
data-intensive science experiments
Human behavior
clean slate
Human Factors
information centric networking
information retrieval
intelligent data retrieval
intercontinental NDN testbed
intercontinental network
internet
biblio
I(FIB)F: Iterated bloom filters for routing in named data networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
information-centric networking
standards
Routing
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
named data networks
named data networking
Metrics
Memory management
iterative hashes
iterated bloom filters
Internet of Things
internet
clean slate
Information filters
Human Factors
human factor
Human behavior
hierarchical names
Future Internet
forwarding strategy
forwarding information base
energy supply
data structures
Cryptography
content distribution efficiency
Constrained Devices
collaboration
clean-slate redesign
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
MAS: Mobile-Apps Assessment and Analysis System
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile Applications
Trusted Computing
Taiwan government
static analysis
Security Validation
security of data
Scalability
Resiliency
resilience
pubcrawl
program diagnostics
Mobile Security
mobile computing
Mobile communication
mobile apps assessment and analysis system
Android (operating system)
Metrics
MAS
Human Factors
Human behavior
Guidelines
Government
Google Play store
Google
encryption
dynamic analysis
automatic security validation system
android encryption
Android apps
Android app
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
biblio
CrackDex: Universal and automatic DEX extraction method
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
invasive software
virtual machines
universal unpacking system
universal DEX extraction
smart phones
simulation execution
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile computing
Metrics
Manuals
Libraries
Android (operating system)
Humanoid robots
Human Factors
Human behavior
encryption
DEX restoration
DEX reassembling
DEX packing
CrackDex
automatic DEX extraction
app
antivirus software
Androids
android encryption
Android application packing
« first
‹ previous
…
665
666
667
668
669
670
671
672
673
…
next ›
last »