Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Google
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Markov processes
Chained Attacks
target NFC network
near-field communication
markov chain
intrusive detection system
electronic payment cases
attack anomalies
Near Field Communication
Training data
security of data
embedded system security
Relays
relay attack
Google
pubcrawl
Resiliency
Data models
security
Scalability
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 1:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Plagiarism Detection Using Semantic Knowledge Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 1:44pm
pubcrawl
unstructured text
text analysis
string matching algorithms
Software
Semantics
semantic similarity
semantic knowledge graphs
Semantic
Scalability
Resiliency
resilience
relations
Data mining
plagiarism detection
Plagiarism
nip
natural language processing
named entity recognition
knowledgegraphs
intellectual property
industrial property
Human behavior
graph theory
Google
biblio
On Application of Natural Language Processing in Machine Translation
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
Mathematical model
statistical corpora
Scalability
Resiliency
pubcrawl
pub
Neural networks
neural nets
neural machine translation
natural language processing
Big Data
machine translation
learning (artificial intelligence)
language translation
Human behavior
History
Google
deep learning
Decoding
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 9:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
« first
‹ previous
1
2
3
4
5
6
next ›
last »