Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
electronic messaging
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
An android application to secure text messages
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile handsets
text-based communication type
text messages security
text messages
text analysis
Software
SMS
smart phones
short message service
Senior citizens
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile phone users
Android (operating system)
mobile computing
Metrics
message content
Human Factors
Human behavior
graphical user interfaces
graphical user interface
encryption
electronic messaging
Elderly
confidentiality
communication
android encryption
Android application
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
A deep learning-based RNNs model for automatic security audit of short messages
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
short message security audit
pubcrawl
recurrent neural nets
recurrent neural networks (RNNs)
Resiliency
security
Semantics
sentence feature vector
sentiment analysis
sentiment classification
prisons
short messages automatic security audit
Support vector machines
text categorization
text classification
Training
Vectors
word order information
Word2Vec
Governance
Artificial Neural Networks
bag of words
binary classification
collaboration
deep learning
deep learning-based recurrent neural networks
deep learning-based RNN model
electronic messaging
feature extraction
artificial neural network
Government
learning (artificial intelligence)
Logic gates
message authentication
pattern classification
police data processing
Policy
policy-based governance
biblio
"Multi-path Based Avoidance Routing in Wireless Networks"
Submitted by grigby1 on Tue, 02/14/2017 - 12:52pm
multipath message avoidance routing protocol
wireless network
speedy advancement
secure communication
Routing protocols
Routing
radio networks
pubcrawl170102
network coding
coding scheme
multipath channels
MPAR protocol
encryption
encoding
electronic messaging
data encryption
Cryptographic Protocols
computer hardware
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Intelligent wall mounted wireless fencing system using wireless sensor actuator network
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
wireless camera
multihop routing
multilevel detection mechanism
radio transceivers
safety systems
Software
telecommunication computing
telecommunication network routing
wall mounted wireless intrusion detection system
Monitoring
Wireless communication
wireless mesh network
wireless mesh networks
wireless sensor actuator network
Wireless Sensor Network
wireless sensor networks
Zigbee
intelligent wall mounted wireless fencing system
Cameras
cellular radio
central control station
Communication system security
electronic messaging
GSM modem
IEEE 802.15.4
IEEE 802.15.4 protocol
active RFID
Intrusion Detection
intrusion software
IR based intrusion detection system
IR based perimeter protection
IR transceiver module
microwave based intrusion detection
microwave sensor technology
« first
‹ previous
1
2