Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Portable computers
biblio
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission
Submitted by grigby1 on Mon, 12/20/2021 - 1:18pm
Human behavior
Virtual machining
Resiliency
resilience
pubcrawl
Portable computers
Metrics
Meters
malware
LAN
Air gaps
exfiltration
Ethernet
electromagnetic
data leakage
covert channels
Computers
composability
Communication cables
air-gap
biblio
Device Selection Decision Making using Multi-Criteria for Offloading Application Mobile Codes
Submitted by aekwall on Mon, 10/04/2021 - 2:07pm
Resiliency
Pervasive Computing Security
Portable computers
Mobile handsets
fuzzy TOPSIS
device selection
application partitioning
analytic hierarchy process
AHP
security
Metrics
Scalability
pubcrawl
pervasive computing
performance evaluation
Bandwidth
Human Factors
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
biblio
Augmented Reality in Human-Robot Cooperative Search
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
navigation
Three-dimensional displays
situational awareness
Scalability
robots
robot vision
Resiliency
resilience
pubcrawl
privacy
Portable computers
augmented reality
Monitoring
mobile robots
intelligent robots
human-robot interaction
human-robot cooperative search
human teammate
Human behavior
field environments
Biomedical monitoring
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
modulation
wearable computers
user personal portable devices
secure proximity estimation
Resiliency
pulse modulation
pubcrawl
proximity based continuous and secure authentication
Protocols
Portable computers
PCASA
password
acoustic communication
message authentication
Human behavior
fingerprint scan
estimation theory
estimation
differential pulse position modulation
composability
authorisation
authentication
Acoustic Fingerprints
Acoustic communication (telecommunication)
« first
‹ previous
1
2