Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
BYOD
biblio
BYOZ: Protecting BYOD Through Zero Trust Network Security
Submitted by aekwall on Fri, 01/13/2023 - 3:52pm
network security
network security policy
BYOD
security policies
Continuous Authentication
zero trust
Pandemics
COVID-19
Companies
Human Factors
Resiliency
Metrics
Scalability
pubcrawl
authorization
authentication
privacy
biblio
Information System Audit for Mobile Device Security Assessment
Submitted by grigby1 on Fri, 04/01/2022 - 1:33pm
Task Analysis
Security Audits
mobile device
Information System Management
bring your own device
audit
BYOD
Mobile Security
Mobile handsets
pubcrawl
Business
Information systems
Cybersecurity
Guidelines
Scalability
Resiliency
resilience
Human behavior
biblio
An Automated Solution For Securing Confidential Documents in a BYOD Environment
Submitted by grigby1 on Tue, 01/25/2022 - 4:53pm
pubcrawl
resilience
Resiliency
composability
Access Control
BYOD
Automated Secure Software Engineering
Document Sensitivity Classification
File Event
File Injection
biblio
A GDPR Compliant Proposal to Provide Security in Android and iOS Devices
Submitted by grigby1 on Wed, 08/11/2021 - 11:59am
pubcrawl
Human Factors
Metrics
resilience
Resiliency
composability
android
BYOD
ios
GDPR
MDM
iOS Security
biblio
Secure Wipe Out in BYOD Environment
Submitted by aekwall on Mon, 01/11/2021 - 1:30pm
Scalability
encryption
Hardware
performance evaluation
real-time systems
pubcrawl
tools
privacy
Standards organizations
computer science
BYOD
cryptographic erasure
deletion
Memory Forensics
Per-file deletion
data deletion
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 11:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
An Attack Scenario and Mitigation Mechanism for Enterprise BYOD Environments
Submitted by aekwall on Mon, 06/10/2019 - 10:17am
attack mitigation
bring your own device (BYOD)
composability
countermeasures
BYOD
data leakage
enterprise networks
Internet of Things (IoT)
MANET Attack Mitigation
Metrics
pubcrawl
Resiliency
rogue access point
security
smartwatch
wi-fi direct printers
biblio
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication
Submitted by grigby1 on Wed, 07/18/2018 - 10:23am
two-factor authentication
two factor authentication
Survey study
Security in organizations
pubcrawl
Human Factors
human factor
human behaviour
Bring-your-own-device
2FA
Human behavior
BYOD
biblio
Kings Eye: Platform Independent Situational Awareness
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
operating system
user interfaces
Smart device
situational awareness
Servers
security
Resiliency
pubcrawl
Prototypes
platform independent situational awareness prototype
batteries
Mobile communication
military systems
military equipment
Metrics
kings eye
Databases
composability
BYOD
bring your own device
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
1
2
next ›
last »