Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
Analysis for crime prevention using ICT. A review of the scientific literature from 2015 – 2021
Submitted by grigby1 on Fri, 08/26/2022 - 1:30pm
Mobile handsets
systematic review
Motion detection
crime prevention
crime
confinement
law enforcement
video surveillance
Systematics
pubcrawl
Mobile Applications
real-time systems
composability
ICT
privacy
Resiliency
resilience
biblio
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
Online banking
SM2-CSA
SM2 Algorithm
Cooperative-Signature Algorithm
Teleworking
Computational efficiency
Mobility
Concurrency
Elliptic curves
digital signature
security
Mobile handsets
Complexity theory
Metrics
sensors
composability
Resiliency
resilience
pubcrawl
biblio
Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSP
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
Analytical models
authentication
CSP
Data models
Data Security
Internet of Things
IoT
Mobile handsets
modeling
pubcrawl
resilience
Resiliency
security
System recovery
Trustworthy Systems
verification
biblio
A novel Two-Factor HoneyToken Authentication Mechanism
Submitted by aekwall on Thu, 07/14/2022 - 4:17pm
security
Cryptography
password
internet
authentication
pubcrawl
Resiliency
Prototypes
cyber-physical systems
Mobile handsets
two factor authentication
QR codes
honeywords
biblio
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities
Submitted by aekwall on Thu, 07/14/2022 - 4:15pm
Phishing
QR codes
quick response code
QR code
DSA
digital signature
codes
Elliptic curves
Mobile handsets
Cryptography
cyber-physical systems
Software algorithms
Resiliency
pubcrawl
Protocols
Software
security
biblio
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT
Submitted by grigby1 on Mon, 06/06/2022 - 12:56pm
Internet of Things
privacy
Cloud Computing
Monitoring
IoT
pubcrawl
Scalability
Mobile handsets
Clustering algorithms
Human Factors
spyware
human in the loop
human-in-the-loop
biblio
Dynamic Graph Based Encryption Scheme for Cloud Based Services and Storage
Submitted by grigby1 on Tue, 05/03/2022 - 4:56pm
NP-hard
Software
Security Heuristics
Scalability
Resiliency
resilience
pubcrawl
predictability
NP-hard problem
Cloud Computing
Mobile handsets
Heuristic algorithms
graph partition
Genetics
fine-grained
computer architecture
Cloud Security
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
Risk-Based Adaptive User Authentication for Mobile Passenger ID Devices for Land/Sea Border Control
Submitted by grigby1 on Mon, 04/18/2022 - 10:56am
Metrics
Security Risk Estimation
Seaports
Scalability
risk-based user authentication
resilience
pubcrawl
mobile passenger ID devices
Mobile handsets
adaptive user authentication
Human Factors
Europe
estimation
Economics
Conferences
border control security
authentication
biblio
Information System Audit for Mobile Device Security Assessment
Submitted by grigby1 on Fri, 04/01/2022 - 1:33pm
Task Analysis
Security Audits
mobile device
Information System Management
bring your own device
audit
BYOD
Mobile Security
Mobile handsets
pubcrawl
Business
Information systems
Cybersecurity
Guidelines
Scalability
Resiliency
resilience
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »