Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Application
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
iOS Security
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
android
biblio
Research on Information Security Technology of Mobile Application in Electric Power Industry
Submitted by grigby1 on Wed, 08/11/2021 - 11:58am
pubcrawl
Human Factors
Metrics
resilience
Resiliency
information security
composability
Mobile Application
Power industry
security reinforcement
iOS Security
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 1:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Humanoid robots
Web technologies
voting process
smart phones
smart phone
Servers
Scalability
Resiliency
resilience
pubcrawl
polling booth
OTP
mobile computing
Mobile Application
Metrics
internet
android encryption
Human behavior
government data processing
fraud voters
fraud
encryption
electronic voting
e-voting system
Cryptography
computer science
casted vote count
biometric
Androids
Android platform
AES256 algorithm
Aes256
biblio
IoT Based Smart Video Surveillance System Using Convolutional Neural Network
Submitted by grigby1 on Mon, 01/11/2021 - 1:59pm
Raspberry Pi
microprocessor chips
Mobile Application
mobile computing
MobileNetv2-SSDLite model
object detection
object detection model
police data processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
Smart video surveillance
SMS notification
video signal processing
video surveillance
Web application
crime rate
captured video
client and server architecture
client-server systems
CNN
COCO dataset
common objects in context dataset
convolutional neural nets
convolutional neural network
camera
deep learning
deep video
fully automatic video surveillance systems
image capture
Internet of Things
IoT
IoT based smart video surveillance system
learning (artificial intelligence)
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 4:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
Design, control amp;amp; performance analysis of secure you IoT based smart security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
mobile computing
wireless sensor networks
wireless sensor based security system
smart system
Smart security
smart routing
sensors
security
Safety
Radar vision
Radar tracking
radar imaging
pubcrawl
Mobile Technology
capacitive sensing
Mobile Applications
Mobile Application
IoT based smart security system
Internet of Things
internal security
Intelligent sensors
external security
Cryptography
computational intelligence
Compositionality
composability
capacitive sensors
biblio
Towards Access Control for Network Coding-Based Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network coding-based named data networking
linear all-or-nothing transform
linear AONT
matrix algebra
Metrics
Mobile Application
mobile computing
ndnSIM
network coding
internet
network coding-based NDN
pubcrawl
resilience
Resiliency
Security analysis
telecommunication network routing
Transforms
content producer
authorisation
authorization
authorization key
composability
computational overhead
computer network security
content delivery
content delivery effectiveness
Access Control solution
content-oriented future Internet architecture
Cryptography
encoding
encoding matrix
encryption
in-network caching
information-intensive application
1
2
next ›
last »