Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile network
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
Mobile Security
APP-related information
iMonitor
iOS (operating system)
iOS 9+
iOS devices
labeling system
Mobile app
mobile network
mobile network traffic
APP-level traffic monitoring
mobile traffic monitoring
network monitor
NetworkExtension framework
privacy leakage detection
traffic classification methods
traffic label
User profiling
user-related information
iOS Security
smart phones
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
mobile computing
Monitoring
sensors
Metrics
Virtual private networks
Compositionality
traffic engineering computing
ios
.pcap files
APP labels
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
Security event analysis in XBee-based wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:05pm
network nodes
XBee circuits
wireless sensor networks
wireless mesh networks
wireless mesh network
Wireless communication
telecommunication security
software/hardware assets
security of data
security event collection
security event analysis
security event
Security analysis
security
resilience
pubcrawl
Analytical models
Modeling Attacks
mobile network
microcontrollers
Metrics
Mesh networks
intruder models
data flows
data correlation
cyber-physical systems
cyber-physical security events
Crisis Management
composability
Communication system security
communication protocols
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks