Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smartphone
biblio
Predicting Creditworthiness of Smartphone Users in Indonesia during the COVID-19 pandemic using Machine Learning
Submitted by grigby1 on Wed, 09/20/2023 - 1:05pm
machine learning
machine learning algorithms
Support vector machines
pubcrawl
resilience
Resiliency
privacy
composability
Classification algorithms
Prediction algorithms
smartphone
COVID-19
Pandemics
creditworthiness
Pandemic
biblio
Survey on Touch Behaviour in Smart Device for User Detection
Submitted by grigby1 on Fri, 03/03/2023 - 4:19pm
feature extraction
machine learning
pubcrawl
Human behavior
Metrics
performance evaluation
sensors
Task Analysis
pediatrics
machine learning (ML)
keystroke analysis
keystroke dynamics
children
National Institutes of Health
smartphone
Touch Detection
biblio
Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 1:42pm
Metrics
Somewhat Homomorphic Encryption
Human Factors
fully homomorphic encryption
Home appliances
Homomorphic encryption
statistical analysis
smartphone
public key cryptography
pubcrawl
Portable computers
Computers
Scalability
IoT device
performance evaluation
Conferences
Resiliency
resilience
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 1:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
biblio
Recognizing Driver Talking Direction in Running Vehicles with a Smartphone
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
direction-of-arrival estimation
Acoustic Fingerprints
time-of-arrival estimation
talking status identification
speech signal
Source separation
safety enhancement
recognition
phone placements
multipath effects
microphones
in-vehicle environment
fingerprint based sound source localization approaches
driver talking direction recognition
Driver Talking Direction
driver distraction
road safety
channel fingerprint extraction
Acoustic signal processing
driver information systems
signal classification
classification accuracy
fingerprint
speech processing
Human Factors
smartphone
smart phones
composability
pubcrawl
Human behavior
Resiliency
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 11:03am
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
smartphone
NFC- enabled smartphones
personally owned devices
pubcrawl
resilience
Resiliency
resources access
Servers
smart phones
network security
user authentication
Wi-Fi network
Wireless fidelity
wireless LAN
wireless local area network
WPA2 Enterprise
WPA2-802.1X model
authentication
Near Field Communication
multifactor authentication
Multi-factor authentication
Metrics
hybrid encryption
hybrid cryptosystem
Human Factors
Human behavior
Enterprise WiFi hotspot authentication
enterprise Wi-Fi hotspot authentication
encryption
Cryptography
connectivity
company information
business data transmission
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 10:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
1
2
3
4
next ›
last »