Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Applications
biblio
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques
Submitted by grigby1 on Wed, 12/22/2021 - 11:54am
deep learning
encrypted traffic
explainable artificial intelligence
internet
law enforcement
learning (artificial intelligence)
Limiting
Mobile Applications
Mobile handsets
Multimodal learning
pubcrawl
resilience
Resiliency
Scalability
Traffic classification
xai
biblio
FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications
Submitted by grigby1 on Mon, 12/20/2021 - 10:30am
Conferences
Software
security
Resiliency
resilience
pubcrawl
program analysis
Mobile Applications
maintenance engineering
Insurance
Cryptography
API
Computer bugs
Compositionality
composability
Companies
Automated Program Repair
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API misuses
biblio
Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests
Submitted by grigby1 on Mon, 12/20/2021 - 10:29am
Gated Recurrent Units
XML
Vanilla Recurrent Neural Networks
Training
security
Resiliency
resilience
Recurrent neural networks
pubcrawl
Mobile Applications
long short term memory
API
Conferences
Computational modeling
Compositionality
composability
Bidirectional Recurrent Neural Networks
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
biblio
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information
Submitted by grigby1 on Tue, 10/12/2021 - 1:55pm
data privacy
Ecosystems
Human behavior
identity
internet
IoT
Mobile app
Mobile Applications
privacy
Privacy Policies
pubcrawl
Scalability
smart phones
social networking (online)
biblio
A Practical Defense against Attribute Inference Attacks in Session-based Recommendations
Submitted by aekwall on Tue, 08/31/2021 - 10:50am
Human Factors
privacy
data privacy
real-time systems
Scalability
Inference algorithms
Conferences
pubcrawl
Resiliency
recommender systems
Attribute Inference
Machine learning as privacy attacks
Mobile Applications
Privacy Protections
security and privacy
web services
biblio
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
Submitted by grigby1 on Wed, 08/11/2021 - 10:58am
Mobile Applications
wireless sensor networks
Software Engineering for Mobile
Software
security
Secure Software Development
resilience
pubcrawl
pervasive computing
mobile health
Pervasive Computing Security
Medical services
iOS Security
faces
Empirical Software Engineering
composability
Metrics
Human Factors
Scalability
Resiliency
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
SSI
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
Open Source Software
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
blockchain
Mobile Applications
IdM
identity management systems
identity management system
Identity management
Human behavior
ethereum
Distributed databases
digital services
DID
Decentralized IDentifier
decentralized application
Decentralized App
DApp
Cryptography
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 12:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
« first
‹ previous
1
2
3
4
5
6
next ›
last »