Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Context-Aware Enforcement of Privacy Policies in Edge Computing
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Human behavior
sensitive data
Scalability
pubcrawl
Privacy Policies
privacy model
privacy measures
privacy enhanced applications
privacy
mobile electronic health record
mobile computing
Cloud Computing
electronic health records
ehealth domain
edge computing
e-health
data privacy
context-aware enforcement
context-aware edge computing
context awareness
complex domain-specific privacy policies
biblio
Implementation QR Code Biometric Authentication for Online Payment
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
debit card
transaction sample
transaction process
transaction permits
simple transaction payment
QR code scan
online payment
online merchant
low-cost infrastructure
implementation biometric cloud authentication platform
face verification transaction
face biometric encryption
decryption transaction permission
Cryptography
Code Scan QR
biometric
bank implementation QR code biometric authentication payment online
transaction processing
QR codes
QR code
electronic money
cloud server
cyber physical systems
pubcrawl
Resiliency
mobile computing
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
Research on Privacy Security Risk Evaluation of Intelligent Recommendation Mobile Applications Based on a Hierarchical Risk Factor Set
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
security of data
risk evaluation
recommender systems
pubcrawl
privacy security
network security
mobile computing
Mobile Applications
IR App
intelligent recommendation mobile application
intelligent recommendation
Intelligent Data and Security
hierarchical risk factor set
hierarchical factor set based privacy security risk evaluation method
hierarchical
data privacy
Data mining
data lifecycle factors
consumer privacy security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
mobile computing
Secure File Sharing
resilience
Resiliency
pubcrawl
user intervention
telecommunication security
size 20.0 cm
short distance file transfer
secure face-to-face device authentication
secure authentication
pairing schemes
Nonlinear distortion
Nhuth
mobile devices
authentication
microphones
message authentication
location-sensitive authentication mechanism
location-based-validation model
Harmonic analysis
face-to-face scenarios
face-to-face device-to-device communication
face-to-face D2D
Device-to-device communication
device legitimacy
device authentication consistency
critical security problem
Acoustics
acoustic nonlinearity patterns
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »