Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
Mobile Security
APP-related information
iMonitor
iOS (operating system)
iOS 9+
iOS devices
labeling system
Mobile app
mobile network
mobile network traffic
APP-level traffic monitoring
mobile traffic monitoring
network monitor
NetworkExtension framework
privacy leakage detection
traffic classification methods
traffic label
User profiling
user-related information
iOS Security
smart phones
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
mobile computing
Monitoring
sensors
Metrics
Virtual private networks
Compositionality
traffic engineering computing
ios
.pcap files
APP labels
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 12:21pm
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Security in iOS and Android: A Comparative Analysis
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
permission analysis
ios
hybrid mobile application
Apache Cordova
iOS (operating system)
security features
Permission
Compositionality
user privacy
mobile devices
Android (operating system)
security of data
Human Factors
internet
Metrics
privacy
pubcrawl
Resiliency
mobile computing
Kernel
security
Hardware
data privacy
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
operating systems
iOS Security
user interfaces
text information rendering
rendering (computer graphics)
rendering
iOS operating system
iOS applications
asynchronous text rendering
asynchronous methods
iOS (operating system)
mobile computing
Message systems
Instruction sets
Compositionality
Human Factors
Random access memory
Mobile Applications
text analysis
Metrics
pubcrawl
Resiliency
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Internet of Things
valid users
scalable revocation
Scalability
resource-constrained IoT devices
resource constraints
related schemes
pubcrawl
portable devices
policy-based governance
mobile-based selective sharing
mobile computing
malicious users
IoT
Internet of Things device
authorisation
Cryptography
CP-ABE
constant size CP-ABE
constant number
constant ciphertext length CP-ABE scheme
constant ciphertext
constant cipher-text
collaboration
ciphertext-policy attribute encryption scheme
chosen ciphertext attack secure
CCA-secure
CCA secure proxy-based scalable revocation
C-PROSRCC scheme
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »