Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 1:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 1:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
Evaluation of Network Assisted Handoffs in Heterogeneous Networks
Submitted by grigby1 on Tue, 03/16/2021 - 1:11pm
pubcrawl
Metrics
mobile computing
mobility management (mobile radio)
multihoming
named-object
network assisted handoffs
ORBIT testbed
policy-based approach
LTE
Rebinding
resilience
Resiliency
seamless data transfer
soft handoff
Throughput
WiFi
hard handoff
5G mobile communication
beyond 5G networks
clean slate
collaboration
computer architecture
Distributed Mobility Management
DMM
Handover
5G
heterogeneous networks
Human behavior
ICN
information centric network architecture
internet
IP network
IP networks
biblio
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 11:02am
unused spectrum
Cognitive Radio Security
unlicensed spectrum
spectrum sensing cognitive radio
spectrum sensing
spectrum owners
spectrum hole
Simulink Energy Detection
sense signals
recycle licensed spectrum
primary users
MATLAB Simulink
energy detection
cooperative spectrum sensing
Cooperative Sensing
Cognitive Radio Network.
Detectors
Cognitive Radio Network
cognitive radio
fading channels
radio spectrum management
Wireless communication
AWGN channels
signal detection
cooperative communication
multi-access systems
Interference
Signal to noise ratio
pubcrawl
Resiliency
mobile computing
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 2:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 11:39am
manet attack prevention
Ad hoc networks
Black hole attacks
MANET Attack Detection
mobile computing
pubcrawl
Resiliency
Routing
Routing protocols
Scalability
security
Telecommunications
wireless networks
biblio
Solutions to Black Hole Attacks in MANETs
Submitted by aekwall on Tue, 03/09/2021 - 11:37am
mobile computing
ZRP
self-organising networks
original routing protocol
numerous routing protocols
importance each day
black hole attack solutions
Black hole attacks
OLSR
Dsr
AODV
black holes
Black hole attack
Energy Efficiency
security
Ad hoc networks
Throughput
mobile ad hoc networks
MANET
testing
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
Scalability
RPL
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
An Evaluation of Lower Facial Micro Expressions as an Implicit QoE Metric for an Augmented Reality Procedure Assistance Application
Submitted by aekwall on Mon, 03/01/2021 - 3:47pm
microfacial expressions
complex procedure assistance
continuous QoE metric
continuously infer user QoE
ergonomics
implicit metrics
implicit QoE metric
lower facial microexpressions
micro facial expression
augmented reality procedure assistance application
normal expressions
paper-based procedure assistance control
procedure assistance AR applications
repeatable procedures
traditional accepted post-experience
user acceptability
user quality
work factor metrics
Resists
Task Analysis
mobile computing
Resiliency
pubcrawl
Measurement
statistical analysis
Cameras
Human Factors
Scalability
computer vision
Videos
emotion recognition
face recognition
augmented reality
quality of experience
affective state
AR application
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »