Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern locks
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
Kernel
Scalability
runtime analysis approach
runtime analysis
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
pattern locks
Monitoring
Linux driver patches
Linux
concurrency control
Instruments
inconsistent lock protection
Human Factors
human factor
Human behavior
driver execution
DILP
device drivers
device driver
data race
Concurrent computing
biblio
A Guided Approach to Behavioral Authentication
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
authentication
behavior
Human behavior
human factor
Human Factors
pattern lock
pattern locks
pubcrawl
resilience
Resiliency
Scalability
smartphone
biblio
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
acoustic signals
Human behavior
human factor
Human Factors
mobile device security
pattern lock
pattern locks
pubcrawl
resilience
Resiliency
Scalability
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
Decoding of Mind-Generated Pattern Locks for Security Checking Using Type-2 Fuzzy Classifier
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
resilience
Human Factors
Interval Type-2 Fuzzy Classifier
mind-generated pattern locks
neurological disorder
neuromuscular disability
P300 signals
pattern locks
pubcrawl
human factor
Resiliency
Scalability
security
security checking
signal classification
Training
type-2 fuzzy classifier
electroencephalography
BCI paradigm
BCI system
biometric security option
biometrics (access control)
brain-computer interface system
brain-computer interfaces
Decoding of Pattern Locks
electroencephalogram signals
Band-pass filters
Event RelatedPotentials
feature extraction
Firing
fuzzy set theory
Fuzzy sets
handicapped aids
Human behavior
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 11:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
finger-input
Human behavior
pattern locks
physical vibration
pubcrawl
resilience
Resiliency
Scalability
ubiquitous surfaces
user authentication
biblio
Cost- and Latency-Efficient Redundant Data Storage in the Cloud
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
optimization
storage technologies
storage management
storage cost
standards
Service requirements
Scalability
Resiliency
resilience
Quality of Service requirements
quality of service
pubcrawl
pricing models
Pricing
potential vendor lock
pattern locks
changing storage requirements
long-term storage
local storage systems
latency-efficient redundant data storage
Latency-efficient
Human behavior
heuristic optimization approach
fitting storage solution
encoding
Data placement optimization
Data models
data access patterns
Cost-efficient
cloud-based storage services
Cloud-based storage
Cloud Computing
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »