Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
An Efficient Location Privacy Preserving Model based on Geohash
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Geohash geographic information
privacy models and measurement
user privacy security
Privacy protection model
Location-based service
location-aware mobile devices
LBS privacy protection model
k-anonymity
great hidden trouble
great convenience
data privacy
Geohash coding
efficient location privacy preserving model
location based services
location-based services
query processing
Metrics
pubcrawl
mobile computing
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
query processing
privacy models and measurement
server security
Location-based social applications
location transformation
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
security of data
efficiency
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
efficiency
privacy models and measurement
server security
Location-based social applications
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
query processing
security of data
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »