Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile device
biblio
Data Acquisition and extraction on mobile devices-A Review
Submitted by grigby1 on Fri, 01/06/2023 - 3:50pm
android
physical/logical data acquisition
In-System Programming
full disk encryption
File-Base encryption
Combination Firmware
chip-off
mobile device
Digital Forensics
Resiliency
android encryption
Systematics
encryption
Forensics
operating systems
resilience
Data mining
Companies
Scalability
performance evaluation
Metrics
Human behavior
pubcrawl
biblio
Information System Audit for Mobile Device Security Assessment
Submitted by grigby1 on Fri, 04/01/2022 - 1:33pm
Task Analysis
Security Audits
mobile device
Information System Management
bring your own device
audit
BYOD
Mobile Security
Mobile handsets
pubcrawl
Business
Information systems
Cybersecurity
Guidelines
Scalability
Resiliency
resilience
Human behavior
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 2:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Mobile augmented reality based on cloud computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
image preprocessing
transmission cost reduction
smart phones
Servers
Scalability
resilience
rendering (computer graphics)
pubcrawl
privacy
performance evaluation
Mobile handsets
mobile device
mobile computing
mobile augmented reality rendering system
image resizing
Android smart phone
image matching
image corner detection
image capturing
Human behavior
feature comparisons
fast corner detection
edge detection
Databases
Cloud Computing
Chunghwa Telecoms hicloud
Cameras
Books
book spine matching
augmented reality
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
efficiency
privacy models and measurement
server security
Location-based social applications
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
query processing
security of data
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
query processing
privacy models and measurement
server security
Location-based social applications
location transformation
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
security of data
efficiency
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
1
2
3
next ›
last »