Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
composability
Engines
Metrics
Mobile communication
Mobile handsets
operating systems
Operating systems security
privacy
Privacy Policies
pubcrawl
Resiliency
security
Synchronization
Ubiquitous Computing Security
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
biblio
A smart-phone based privacy-preserving security framework for IoT devices
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
IoT authentication
U-Prove
Resiliency
QR-based authentication
QR codes
pubcrawl
Protocols
privacy
Mobile handsets
IoT privacy-preserving
AI
IoT attributes based authentication
Home appliances
FIDO
embedded systems
cyber physical systems
Cryptography
Cloud Computing
authentication
artificial intelligence security
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
A framework for digital forensics analysis based on semantic role labeling
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Labeling
text analysis
semantic texts annotation
Semantics
semantic role labeling
semantic annotation
Scalability
Resiliency
pubcrawl
Object recognition
natural language processing
Mobile handsets
Crime Analysis
knowledge based systems
knowledge base
Human behavior
frame semantics
FrameFOR
forensic frames
forensic experts
forensic analysis
Digital Forensics
digital forensic analysis
biblio
Infrasonic scene fingerprinting for authenticating speaker location
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
scene recognition rates
Infrasound
localization
mobile computing
mobile devices
Mobile handsets
pubcrawl
Resiliency
robust navigation cues
infrasonic signatures
smartphone recordings
Smartphones
smart phones
speaker recognition
standard smartphone recording
Training
ultra-low frequency cues
feature extraction
Acoustic Filtering
Acoustic Fingerprints
ambient infrasound
authenticating speaker location
authentication
Cepstral analysis
classifier
composability
acceleration-based cepstral features
feature set analysis
fingerprint identification
frequency ranges
human auditory range
Human behavior
infrasonic region
infrasonic scene fingerprinting
biblio
GeneWave: Fast authentication and key agreement on commodity mobile devices
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Acoustic Fingerprints
Acoustics
authentication
composability
Device-to-device communication
encoding
frequency-domain analysis
Hardware
Human behavior
Mobile handsets
pubcrawl
Resiliency
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
keystroke dynamics authentication
two-class classification algorithms
Training
touchscreen
touch sensitive screens
touch screen based devices
pubcrawl170115
pattern classification
one-class classification algorithms
one-class classification
Mobile handsets
mobile devices
mobile computing
mobile authentication
Android (operating system)
keystroke dynamics
Keyboards
feature extraction
Error analysis
equal error rate
EER
biometrics (access control)
biometrics
authorisation
authentication test-framework
authentication
Android devices
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »