Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
Internet of Things (IoT) Based Door Lock Security System
Submitted by aekwall on Fri, 04/01/2022 - 2:05pm
Predictive Metrics
Scientific Computing Security
security system
mobile
Internet of Things (IoT)
scientific computing
Arduino
information management
android
privacy
Mobile Applications
wireless networks
Prototypes
Compositionality
Resiliency
pubcrawl
Pins
biblio
Cloud based mobile application security enforcement using device attestation API
Submitted by aekwall on Tue, 01/25/2022 - 3:48pm
web services
STRID
SafetyNet
Mobile OS
mobile
Google Play Services
education
attestation
android
Mobile handsets
Computational modeling
Mobile Applications
composability
Human behavior
Resiliency
pubcrawl
rest
Analytical models
Cloud Computing
biblio
Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
Submitted by grigby1 on Thu, 12/17/2020 - 2:02pm
mobile
static analysis
Software
security
robot operating systems
Resiliency
resilience
pubcrawl
policy-based governance
patch
Androids
machine learning
Libraries
IoT
Humanoid robots
Human Factors
Human behavior
Firmware Vulnerabilities
dynamic analysis
deep learning
biblio
Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks
Submitted by grigby1 on Wed, 12/02/2020 - 1:54pm
software defined multipath TCP solution
relay networks (telecommunication)
relay points
resilience
Resiliency
satellite communication system
satellite failure
Satellites
Scalability
service interruption
shore nodes
single link failure
single-path model
single-path TCP communication methods
pubcrawl
software defined networking
software-defined networking
source node movements
stable network handovers
tactical networks
TCP connectivity
telecommunication network reliability
transport protocols
Unmanned Aerial Vehicles
wireless
Wireless communication
wireless network technologies
wireless signal outage
mobile wireless heterogeneous networks
Bandwidth
communication interruption
communication model
connectable relay point
control systems
coupled congestion control
frequent network handovers
inherent mobility
Marine vehicles
military communication
military computing
Mininet-WiFi emulation testbed
mobile
autonomous aerial vehicles
mobile wireless tactical networks
mobility management (mobile radio)
Multi-Path TCP
multipath channels
naval battle networks
Naval Battlefield Network communications
naval entities
network connectivity
network handover delay
network stability
noninteractive data
nonnegligible overhead
Protocols
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 12:03pm
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 11:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
host app
Trustworthy Systems
trustworthy execution environment
trusted OS
trusted applications
TEE driver
TEE constructing method
secure world
secure functions
secure code size
popular security features
mobile platforms
mobile app dynamically
mobile
security of data
current TEE solutions
ALTEE
.so library
cyber physical systems
TEE
operating systems (computers)
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
TrustZone
biblio
Not On My Phone: Exploring Users' Conception of Related Permissions
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
expert systems
Human Factors
materialization
mental models
mobile
Permission
privacy
pubcrawl
Scalability
1
2
3
next ›
last »