Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Blackhole Attack Cooperative Prevention Method in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 3:13pm
manet attack prevention
Ad hoc networks
AODV
Blackhole
Compositionality
Conferences
MANET
MANET security
Metrics
mobile computing
Proposals
pubcrawl
Resiliency
Routing
Routing protocols
security
biblio
Classification of Misbehaving nodes in MANETS using Machine Learning Techniques
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
Neural networks
Support vector machines
Analytical models
pubcrawl
Metrics
Resiliency
machine learning
Compositionality
Throughput
Ad hoc networks
mobile computing
BPNN
malicious node
Mobile Ad-Hoc Network (MANET)
SVM
MANET security
biblio
B4SDC: A Blockchain System for Security Data Collection in MANETs
Submitted by aekwall on Mon, 08/02/2021 - 3:11pm
Task Analysis
pubcrawl
Metrics
Resiliency
blockchain
Compositionality
Ad hoc networks
Data collection
Incentive mechanism
MANETs
mobile computing
Nickel
security-related data collection
MANET security
biblio
VANET: Towards Security Issues Review
Submitted by aekwall on Mon, 08/02/2021 - 3:08pm
attacks
authentication
automobiles
Compositionality
Cryptography
DoS
manet privacy
Metrics
mobile computing
privacy
pubcrawl
Resiliency
security
VANET
vehicular ad hoc networks
Wireless communication
biblio
A Review of Mobile Forensic Investigation Process Models
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
information forensics
reviews
redundant investigation processes
mobile-based services
mobile scenarios
mobile forensics field
mobile forensics
mobile forensic tools
mobile forensic investigation process models
MFIPMs
MF transitions
MF field
forensic practitioners
investigation process model
tools
mobile devices
Unified modeling language
smart phones
mobile computing
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Digital Forensics
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Cloud Security
Organizations
mobile edge mitigation model
mobile edge computing mitigation model
Mobile Edge
knowledgebase approach
insider threat problem
dependency
database
cloud users
cloud internal users
insider threat
malicious insiders
malicious outsiders
cloud
security of data
Metrics
knowledge based systems
mobile computing
Cloud Computing
private data
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threats
Knowledgebase
biblio
Testbed-based Performance Evaluation of the Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
ICN network
basic CCN architecture
caching
CCN
computer network performance evaluation
content delivery time
content transfer time
efficient network management
fast content delivery
ICN concept
content retrieval
Internet usage
multimedia applications
Multimedia systems
naming
performance requirements
testbed
testbed architecture
testbed-based performance evaluation
traffic load control
Load modeling
telecommunication traffic
security
performance evaluation
mobile computing
computer network management
Resiliency
pubcrawl
Routing
internet
Scalability
information and communication technology
ICN
information-centric networking
Information Centric Networks
Internet architecture
in-network caching
improved security
mobility support
biblio
Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
India
User behaviour
smartphone users
Smartphone user
smart phones
security
secure behaviour
pubcrawl
protection motivation theory
planned behaviour
mobile computing
behaviour change
Human Factors
Human behavior
Human aspect
fogg behaviour model
cybersecurity behaviour
cybersecurity awareness program
Cybersecurity
Computer crime
behavioural science
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »