Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Applications
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Research and Implementation of Mobile Application Security Detection Combining Static and Dynamic
Submitted by aekwall on Mon, 10/05/2020 - 11:54am
automated platform for security detection of mobile application system
Dynamic Networks and Security
server security detection
security detection of mobile application
security detection combining static and dynamic
Packaging
mobile intelligent terminals trend
mobile application traffic
mobile application security detection
mobile application client
fuzzy testing method
client security detection
capture mobile application traffic
security of data
Engines
Fingerprint recognition
Mobile Applications
client-server systems
internet
Metrics
composability
pubcrawl
Resiliency
mobile computing
security
Servers
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
operating systems
iOS Security
user interfaces
text information rendering
rendering (computer graphics)
rendering
iOS operating system
iOS applications
asynchronous text rendering
asynchronous methods
iOS (operating system)
mobile computing
Message systems
Instruction sets
Compositionality
Human Factors
Random access memory
Mobile Applications
text analysis
Metrics
pubcrawl
Resiliency
biblio
Healthcare IoT: Benefits, vulnerabilities and solutions
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
medical data
white box cryptography
security defense
security
reverse engineering
return oriented programming techniques
Resiliency
pubcrawl
obfuscation technique
obfuscation
Monitoring
Mobile Applications
Metrics
Medical services
Medical diagnostic imaging
Access Control
medical computing
Internet of Things
implantable medical devices
implantable health gadgets
healthcare IoT system
healthcare IoT
health care
data privacy
Cryptography
Computer crime
composability
Biomedical monitoring
authorisation
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Research on Privacy Security Risk Evaluation of Intelligent Recommendation Mobile Applications Based on a Hierarchical Risk Factor Set
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
security of data
risk evaluation
recommender systems
pubcrawl
privacy security
network security
mobile computing
Mobile Applications
IR App
intelligent recommendation mobile application
intelligent recommendation
Intelligent Data and Security
hierarchical risk factor set
hierarchical factor set based privacy security risk evaluation method
hierarchical
data privacy
Data mining
data lifecycle factors
consumer privacy security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
« first
‹ previous
1
2
3
4
5
6
next ›
last »