Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Applications
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
biblio
A Control-Theoretic Approach for Location Privacy in Mobile Applications
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
location privacy
users mobility pattern
Scalability
Resiliency
resilience
pubcrawl
protection algorithm
privacy issues
privacy
POI-related privacy measure
PI control strategy
PI control
mobility records simulation
mobile computing
Mobile Applications
Meters
Computing Theory and Privacy
location information
literature focus
Human behavior
dynamic modeling
dispersion
data privacy
Data models
cyber physical systems
Cyber Physical System
control-theoretic approach
control-based approach
Control Theory
control signals
control formulation
biblio
Safe Stream-Based Programming with Refinement Types
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
collaboration
Human behavior
Human Factors
Metrics
Mobile Applications
policy-based governance
pubcrawl
refinement types
resilience
Resiliency
Safe Coding
stream-based programming
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
Design, control amp;amp; performance analysis of secure you IoT based smart security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
mobile computing
wireless sensor networks
wireless sensor based security system
smart system
Smart security
smart routing
sensors
security
Safety
Radar vision
Radar tracking
radar imaging
pubcrawl
Mobile Technology
capacitive sensing
Mobile Applications
Mobile Application
IoT based smart security system
Internet of Things
internal security
Intelligent sensors
external security
Cryptography
computational intelligence
Compositionality
composability
capacitive sensors
biblio
MAS: Mobile-Apps Assessment and Analysis System
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile Applications
Trusted Computing
Taiwan government
static analysis
Security Validation
security of data
Scalability
Resiliency
resilience
pubcrawl
program diagnostics
Mobile Security
mobile computing
Mobile communication
mobile apps assessment and analysis system
Android (operating system)
Metrics
MAS
Human Factors
Human behavior
Guidelines
Government
Google Play store
Google
encryption
dynamic analysis
automatic security validation system
android encryption
Android apps
Android app
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
« first
‹ previous
1
2
3
4
5
6
next ›
last »