Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile environment
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 12:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
Ransomware Inside Out
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Metrics
smart phones
security
Resiliency
ransomware functionality
Ransomware
pubcrawl
model checking
mobile environment
mobile computing
Mobile communication
android
malware
Java
invasive software
Humanoid robots
Human behavior
formal verification
formal methods
formal method
composability
Androids
biblio
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Submitted by BrandonB on Mon, 05/04/2015 - 12:10pm
Humanoid robots
storage encryption
Steganography
steganographic techniques
plausibly deniable encryption
PDE
Mobile Platform Security
Mobile handsets
mobile environment
mobile devices
mobile computing
Mobile communication
Mobiflage
MF-SD
MF-MTP variant
Law
Android (operating system)
File system security
FAT32 removable SD cards
Ext4 file system mechanisms
encryption
desktop OS
desktop environment
deniable storage encryption
deniable encryption
decryption keys
data-block allocator
data confidentiality
Cryptography
Androids
Android OS
biblio
Human acoustic fingerprints: A novel biometric modality for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 10:31am
mobile devices
unsupervised learning approach
transient evoked otoacoustic emission
Training
Time-frequency Analysis
security
pre-enrolled identity gallery
otoacoustic emissions
Otoacoustic Emission
Neural networks
neural nets
Mobile Security
Mobile handsets
mobile environment
Acoustic signal processing
mobile computing
Mobile communication
mobile biometric system
learning model
learning (artificial intelligence)
human acoustic fingerprints
generic dataset
feature extraction
blind recognition problem
biometrics (access control)
Biometric Verification
biometric modality
Autoencoder Neural Network
biblio
A secured distributed OCR system in a pervasive environment with authentication as a service in the Cloud
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
multiprocessing
vocabularies
security of data
security issue
security
secured distributed OCR system
recognition process
pervasive environment
Pattern recognition
Optical character recognition software
optical character recognition
natural language processing
authentication
mobile environment
mobile computing
Mobile communication
Distributed OCR system
distributed computing technologies
distributed Arabic optical character recognition
Computational modeling
cloud computing technology
Cloud Computing
authentication as a service