Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Apps
biblio
Quality analysis of mobile applications with special focus on security aspects
Submitted by grigby1 on Fri, 09/30/2022 - 2:55pm
Compositionality
ios
code smells
code evolution
codes
iOS Security
Resiliency
Mobile Apps
visualization
Mobile Applications
computer architecture
Libraries
Industries
resilience
Metrics
Human Factors
pubcrawl
security
Training
biblio
Privacy Policies of Mobile Apps - A Usability Study
Submitted by grigby1 on Thu, 02/24/2022 - 11:23am
Scalability
readability metrics
pubcrawl
Privacy Policies
privacy
Mobile Apps
Mobile Applications
Metrics
Measurement
law enforcement
Human behavior
data privacy
Conferences
biblio
Metamorphic Detection of Repackaged Malware
Submitted by aekwall on Mon, 02/07/2022 - 4:05pm
Mobile Apps
Training
Support vector machines
Resiliency
repackaged malware
pubcrawl
privacy
Predictive Metrics
Neural networks
Computer bugs
Mobile Applications
malware detection
malware classification
malware
Index Terms—machine learning
Human behavior
feature extraction
biblio
Web APIs in Android through the Lens of Security
Submitted by grigby1 on Wed, 01/20/2021 - 3:19pm
network communication
web communication
Web APIs
Web API URLs
telecommunication security
security of data
security
Resiliency
resilience
public domain software
pubcrawl
open-source apps
network libraries
Android apps
mobile computing
Mobile Apps
JSON data schemas
internet
Compositionality
communication libraries
communication
application programming interface
application program interfaces
APIs
API service providers
API
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Mobile Apps
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Android devices
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
cyber physical systems
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
Internet of Things
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
biblio
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps
Submitted by aekwall on Mon, 04/13/2020 - 9:05am
Security by Default
User Ratings
trust
subjective logic
static taint analysis
smart phones
smart mobile devices
SERS
sentiment analysis
security-related internal aspect
security-related comments
security-related and evidence-based ranking scheme
security of data
app distribution platforms
security
Scalability
Resiliency
ranking
pubcrawl
mobile computing
Mobile Apps
Measurement
Google PlayStore
Google
Databases
Data mining
biblio
Open Source Based Privacy-Proxy to Restrain Connectivity of Mobile Apps
Submitted by K_Hooper on Wed, 10/25/2017 - 10:55am
Human behavior
Mobile Apps
privacy
Privacy Policies
proxy
pubcrawl
Scalability
security
sensitive information