Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Applications
biblio
Killing the password, part 1: An exploratory analysis of walking signatures
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
authentication
Global Positioning System
Human behavior
Identity management
identity management systems
Legged locomotion
Meteorology
Mobile Applications
network security
pubcrawl
Resiliency
Scalability
sensors
Statistical Learning
biblio
Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Online banking
triple DES algorithm
transmission process
smart cards
Smart card
Servers
secret filming
secret code
Resiliency
QR codes
QR code
pubcrawl
Personal Identification Number
peeping attack
ATM machine
Mobile Applications
Mobile Application
encoded QR information
DES algorithm
Databases
data privacy
Data Encryption Standard
cyber physical systems
Cryptography
Automated Teller Machine
authorisation
authentication system
authentication
biblio
Trusted Sensors for Participatory Sensing and IoT Applications Based on Physically Unclonable Functions
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
Human behavior
Internet of Things
Mobile Applications
participatory sensing
privacy
pubcrawl
PUF
Resiliency
Scalability
sensor security
Tamper resistance
trust
trusted sensors
biblio
Cross-platform Access-rights Analysis of Mobile Applications
Submitted by grigby1 on Wed, 08/02/2017 - 1:53pm
android
composability
cross platform
dynamic analysis
ios
Mobile Applications
permissions
pubcrawl
Resiliency
static analysis
web of trust
biblio
Trusted Sensors for Participatory Sensing and IoT Applications Based on Physically Unclonable Functions
Submitted by grigby1 on Mon, 07/24/2017 - 2:05pm
Compositionality
Human behavior
Internet of Things
Metrics
Mobile Applications
participatory sensing
privacy
pubcrawl
PUF
Repudiation
Resiliency
trust
trusted sensors
biblio
An Ontological Approach to Digital Storytelling
Submitted by grigby1 on Thu, 05/18/2017 - 2:20pm
adaptive systems
Digital Storytelling
Human behavior
Kerberos
Metrics
Mobile Applications
Ontologies
pubcrawl
Resiliency
social networks
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
file
SoS and Hard Problems
Submitted by scherlis on Fri, 11/01/2013 - 12:05pm. Contributor:
William L. Scherlis
Composition
Resilient Systems
Science of Security
Foundations
distributed systems
Frameworks
Mobile Applications
proofs
security information
Signatures
usability
User behavior
Academia
Presentation
SoS Quarterly Lablet Meeting, Sept '13 at CMU
Composition
CMU
NSA SoS Lablets Materials
file
Designed-In Security for Mobile Applications
Submitted by JonathanAldrich on Thu, 07/05/2012 - 12:00pm. Contributors:
Jonathan Aldrich
Marwan Abi-Antoun
Ciera Jaspan
Michael Maass
Cyrus Omar
Joshua Sunshine
Architectures
Science of Security
Carnegie Mellon University
Mobile Applications
National HCSS Conference 2012
Academia
Presentation
Designed-In Security (HCSS'12)
« first
‹ previous
1
2
3
4
5
6