Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smartphone
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
A Guided Approach to Behavioral Authentication
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
authentication
behavior
Human behavior
human factor
Human Factors
pattern lock
pattern locks
pubcrawl
resilience
Resiliency
Scalability
smartphone
biblio
Detecting Smartphone State Changes Through a Bluetooth Based Timing Attack
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Resiliency
Human behavior
pubcrawl
composability
privacy
Bluetooth
Change point detection
L2CAP
smartphone
Timing attack
bluetooth security
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Smart bluetooth low energy security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
smart phones
PSoC 4 BLE
pubcrawl
resilience
Resiliency
security
sensors
Servomotors
smart Bluetooth low energy security system
physical lock
smartphone
surveillance system
system-on-chip
Web page
Web site
wireless connection
wireless technologies
BLE (Bluetooth Low Energy)
low energy consumption security system
IoT (Internet of Things)
image transmission
human factor
Human behavior
energy security
energy consumption
Conferences
composability
Cameras
building management systems
bluetooth security
Bluetooth
BLE technology
biometric
biblio
Towards accessible mobile pattern authentication for persons with visual impairments
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
smart phones
pattern locks
pressure gradient input
pubcrawl
resilience
Resiliency
Scalability
security
security applications
pattern lock
smartphone
Smartphones
touch sensitivity
usage scenario
user interface related issues
user preferred color combination
visual impairments
Visually Impaired
graphical user interfaces
accessible mobile pattern authentication
accessible security application
Android users
authentication
authentication strength
authorisation
color blind users
complex design
access barrier
handicapped aids
Human behavior
Image color analysis
inaccessible design
Mobile communication
mobile computing
mobile locks
password
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
BYOD for Physics Lab: Studying Newton's Law of Cooling with a Smartphone
Submitted by grigby1 on Mon, 03/19/2018 - 2:04pm
Analogical Transfer
analogies
computer skills
heat transfer
high-school students
Human behavior
Human Factors
Newton's law of cooling
Physics
pubcrawl
smartphone
thermometer
Transference
« first
‹ previous
1
2
3
4
next ›
last »