Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Retina
invisible data encoding
Metrics
Mobile handsets
mobile phone screens
novel modulation method
optical modulation
optical transmitters
pubcrawl
Receivers
resilience
Resiliency
Image color analysis
Scalability
Steganography
telecommunication security
time 2.0 d
uniform data
unlicensed bandwidth resources
unobtrusive steganography methods
user distraction
visible light communications
visual MIMO
display screencamera communication
BER
Bit error rate
camera based receiver architectures
Cameras
color shift based methods
data encapsulation
data hiding capability
Data Transmission
Demodulation
demodulation mechanisms
Device-to-device communication
Visible Light Communications Security
display transmitters
error correction codes
error statistics
foveation
foveation based data hiding
FoVLC
free-space optical communication
HAN systems
home area networking system
human visual system
biblio
Addressing Security Challenges in Industrial Augmented Reality Systems
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
privacy
wireless networking
Streaming media
Smart industry
security risks
security of data
security goals
security challenges
security assets
security
Scalability
Resiliency
resilience
pubcrawl
productive applications
augmented reality
Pipelines
Mobile handsets
Industry 4.0 augmented reality
Industry 4.0
Industries
industrial augmented reality systems
industrial AR applications
human-machine communication
Human behavior
edge computing
distributed computing
contemporary AR applications
Cameras
biblio
Game theoretic study on blockchain based secure edge networks
Submitted by grigby1 on Thu, 08/23/2018 - 11:37am
Metrics
Servers
security
Scalability
Resiliency
resilience
punishment scheme
pubcrawl
Predictive Metrics
performance evaluation
network security
NE
Nash equilibria
Mobile handsets
mobile device
attack motivation
illegal security gains
Human Factors
Games
game theory
game theoretic study
game theoretic security
edge server
edge network
data privacy
Cloud Computing
blockchain-based secure edge networks
blockchain security game
blockchain security
blockchain
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
An android application to secure text messages
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile handsets
text-based communication type
text messages security
text messages
text analysis
Software
SMS
smart phones
short message service
Senior citizens
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile phone users
Android (operating system)
mobile computing
Metrics
message content
Human Factors
Human behavior
graphical user interfaces
graphical user interface
encryption
electronic messaging
Elderly
confidentiality
communication
android encryption
Android application
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »