Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android encryption
biblio
Data Acquisition and extraction on mobile devices-A Review
Submitted by grigby1 on Fri, 01/06/2023 - 3:50pm
android
physical/logical data acquisition
In-System Programming
full disk encryption
File-Base encryption
Combination Firmware
chip-off
mobile device
Digital Forensics
Resiliency
android encryption
Systematics
encryption
Forensics
operating systems
resilience
Data mining
Companies
Scalability
performance evaluation
Metrics
Human behavior
pubcrawl
biblio
A Reliable, Secure and Efficient Decentralised Conditional of KYC Verification System: A Blockchain Approach
Submitted by grigby1 on Fri, 01/06/2023 - 3:50pm
resilience
gas
fully homomorphic encryption (FHE)
blockchains
Resiliency
android encryption
Pressing
distributed ledger
ethereum
Schedules
Manuals
Law
authentication
Scalability
Metrics
Human behavior
pubcrawl
blockchain
biblio
Evaluating Opcodes for Detection of Obfuscated Android Malware
Submitted by grigby1 on Fri, 01/06/2023 - 3:49pm
encryption
Engines
pubcrawl
Human behavior
Metrics
Scalability
malware
Artificial Intelligence
Semantics
resilience
android encryption
obfuscation
Resiliency
codes
LSTMs
opcodes
biblio
Advanced Lightweight Encryption Algorithm for Android (IoT) Devices
Submitted by grigby1 on Fri, 01/06/2023 - 3:49pm
privacy
Lightweight
Resiliency
attack
Hazards
android encryption
android
Software algorithms
resilience
Receivers
Cryptography
encryption
authentication
Scalability
performance evaluation
Software
Heuristic algorithms
Metrics
Human behavior
pubcrawl
IoT
biblio
Three-Pass Protocol Scheme for Securing Image Files Using the Hill Cipher 3x3 Algorithm
Submitted by grigby1 on Mon, 01/10/2022 - 12:18pm
Protocols
Three-Pass Protocol
System testing
Software algorithms
Scalability
Resiliency
resilience
Receivers
pubcrawl
android encryption
Metrics
Java
Human behavior
Hill Cipher
Force
Cryptography
Ciphers
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
iOS Security
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
android
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
Smart Key Using AES Algorithm
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
IoT
Servers
Scalability
Resiliency
resilience
real-time systems
Raspberry Pi
pubcrawl
Mobile Applications
Metrics
key
Advanced Encrypted System (AES)
internet
Human behavior
Hardware
Firebase
encryption
E-Lock
authentication
android encryption
Android app
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
Securing Data Communication Through MQTT Protocol with AES-256 Encryption Algorithm CBC Mode on ESP32-Based Smart Homes
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
privacy
Smart homes
Smart Home
Scalability
Resistance
Resiliency
resilience
pubcrawl
Protocols
AES
MQTT protocol
Metrics
Internet of Things
Human behavior
Force
Esp32
encryption
android encryption
1
2
3
4
5
6
7
next ›
last »