Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet telephony
biblio
Data Manipulation and Digital Forensics Analysis on WhatsApp Application
Submitted by grigby1 on Fri, 09/01/2023 - 3:18pm
social networking (online)
social media forensics
instant messaging applications
data manipulation
Freeware
Internet telephony
Human Factors
mobile forensics
Instant messaging
information forensics
information security
Digital Forensics
Databases
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
WhatsApp: Cyber Security Risk Management, Governance and Control
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
pubcrawl
whatsapp
Vulnerability
threat
social networking (online)
Security Risk Management
security
Scalability
risks
risk management
Resiliency
Access controls
Mobile Applications
Metrics
Internet telephony
Human Factors
Governance
Freeware
data science
controls
assets
biblio
Fine Grained Confinement of Untrusted Third-Party Applications in Android
Submitted by grigby1 on Fri, 08/26/2022 - 1:28pm
Mobile Applications
Third Party Applications
SE-Android
Internet telephony
AOSP
Mobile Security
confinement
spyware
Intelligent systems
cyber security
smart phones
composability
Access Control
privacy
performance evaluation
Resiliency
resilience
pubcrawl
biblio
Use of AES Algorithm in Development of SMS Application on Android Platform
Submitted by grigby1 on Mon, 01/10/2022 - 12:15pm
Metrics
symmetric encryption
SMS application
Scalability
Resiliency
resilience
Reliability
pubcrawl
optimization
AES algorithm
Message service
Market research
Internet telephony
Human behavior
Freeware
encryption
android encryption
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Analysis of Attack and Attackers on VoIP Honeypot Environment
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
pubcrawl
vulnerability exploitation
VoIP-based Honeypot
VoIP Honeypot environment
VoIP
telecommunication security
SIP
Security Tests
security
Scalability
Resiliency
resilience
Reactive power
attacker profiles
Protocols
privacy
low interaction honeypot environment
IP networks
Internet telephony
Human Factors
Human behavior
honeypots
honey pots
Dogs
Conferences
biblio
QoS and security in VOIP networks through admission control mechanism
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
telecommunication congestion control
Resource reservation
computer network security
Probes
Resilient Security Architectures
Loss measurement
IntServ/RSVP
Probe flows
VoIP network security
security
Resiliency
real-time systems
real-time multimedia
quality of service
Internet telephony
information security
Packet loss rate
QoS
Flow priority
digital assets
Multimedia communication
intradomain rerouting
multimedia traffic
Admission control
admission control mechanism
Admission threshold
advance resource reservation technique
Protocols
ecurity
Edge router
NAC
network admission control
pubcrawl
biblio
Malicious users discrimination in organizec attacks using structured sparsity
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
signaling
network security
network server
organized attacks
pubcrawl
Resiliency
security
Servers
session initiation protocol
Signal processing algorithms
network domain
signalling protocols
SIP proxies
SIP servers
structured sparsity based group anomaly detection system
Synchronization
synchronized attack detection
transport layer
Voice over IP
VoIP systems
flooding attack prevention
composability
compressive sensing
Computer crime
computer network security
Current measurement
DDoS
DDoS Attack Prevention
distributed attacks
flooding attack detection
communication network system
flooding-type DDOS attack
Human behavior
Indexes
Internet telephony
malicious groups
malicious users discrimination
message transmission rate
Metrics
biblio
Forensic investigation framework for VoIP protocol
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
packet reordering
VoIP-SIP
VoIP-RTP
VoIP traffic
VoIP protocol
VoIP
Voice over Internet Protocol
Streaming media
SIP
signalling protocols
Servers
RTP
reconstruction algorithm
pubcrawl170109
Protocols
Ports (Computers)
communication facilities
next generation communication services-based IP
network pattern analysis
network forensic investigation framework
malicious users
malicious content
law enforcement system
Internet telephony
Forensics
forensic analysis
Electronic mail
Digital Forensics
cyber criminals
content level observation
Computer crime
biblio
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
ISP
VoIP service
unique sequence signatures
transport protocols
telecommunication traffic
SkyTracer
Skype UDP flow
Skype
Sequence Signature
Protocols
Payloads
optimisation
network performance optimization
Accuracy
IP networks
Internet telephony
internet
information security
host level identification
Flow-level Identification
fine grained Skype traffic identification accuracy
Educational institutions
digital signatures
Correlation-based Approach
computer network performance evaluation
Complexity theory
1
2
next ›
last »