Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smartphones
biblio
An Optimal and Lightweight Convolutional Neural Network for Performance Evaluation in Smart Cities based on CAPTCHA Solving
Submitted by grigby1 on Thu, 06/30/2022 - 12:19pm
convolutional neural network
multimedia iot
cyclical learning policy
CAPTCHA
captchas
smart cities
Smartphones
Sensor Systems
convolutional neural networks
Internet of Things
Numerical models
composability
performance evaluation
Human behavior
pubcrawl
Artificial Intelligence
deep learning
privacy
biblio
Quick and Accurate False Data Detection in Mobile Crowd Sensing
Submitted by grigby1 on Wed, 10/14/2020 - 11:40am
MCS
wireless sensor networks
SVD
Sparse matrices
Smartphones
singular value decomposition
sensors
sensor fusion
Roads
Resiliency
resilience
pubcrawl
Monitoring
mobile crowd sensing
mobile computing
approximation theory
Matrix Separation
Matrix decomposition
Matrix converters
low-rank matrix approximation
LightLRFMS
light weight low rank and false matrix separation algorithm
Iterative methods
iteration process
Human behavior
False Data Detection
DRMF
direct robust matrix factorization
cyber physical systems
composability
biblio
Security of Gestures Based CAPTCHAs
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
mobile devices
security.
mobile gesture CAPTCHA
gyroscopes
accelerometer
Smartphones
gestures
CAPTCHA
Accelerometers
captchas
gesture recognition
security
Mobile handsets
Security analysis
invasive software
mobile computing
composability
Software
Human behavior
pubcrawl
Servers
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
security mechanism
Usability.
sensor readings
network resources
gyroscopes
gyroscope data
gestures
gesture CAPTCHA challenge
CAPTCHA
Accelerometers
accelerometer readings
captchas
malware
usability
gesture recognition
security of data
Smartphones
mobile devices
smart phones
human computer interaction
Mobile handsets
invasive software
mobile computing
composability
performance evaluation
Human behavior
pubcrawl
Servers
security
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
HOTSPOT
air-gapped PCs
airgap crossing technique
Android (operating system)
Android app
covert-channels
CPUs
exfiltration
GPUs
air-gapped computers
isolated PCs
nearby smartphone
temperature
thermal
thermal pings
thermal sensing
thermal signals
pubcrawl
air-gap covert communication channels
air-gap
Air gaps
Information Leakage
Smartphones
smart phones
resilience
Metrics
mobile computing
composability
internet
computer network security
Resiliency
Human Factors
Human behavior
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 11:13am
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
Hybrid Feature Extraction for Palmprint-Based User Authentication
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
user identity verification
texture
Smartphones
smart phones
security
Resiliency
resilience
pubcrawl
palmprint-based user authentication
palmprint recognition
multifactor authentication
mobile verification scenarios
Mobile handsets
mobile computing
authentication
IT systems
image texture
image colour analysis
hybrid feature extraction
Human Factors
Human behavior
Histograms
feature extraction
Discrete Fourier transforms
Databases
color information
biometry
authorisation
biblio
An Efficient Two-Server Password-Only User Authentication for Consumer Electronic Devices
Submitted by grigby1 on Mon, 02/10/2020 - 10:31am
Protocols
two-server password-only remote user authentication protocol
trust model
telecommunication security
SSL Trust Models
SSL
Smartphones
Servers
secure socket layer protocol
Scalability
Resiliency
resilience
pubcrawl
authentication
password
Metrics
message authentication
laptops
impersonation attacks
Human Factors
Human behavior
dictionary attacks
Dictionaries
Cryptographic Protocols
Consumer electronics
consumer electronic devices
1
2
3
next ›
last »