Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Design, control amp;amp; performance analysis of secure you IoT based smart security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
mobile computing
wireless sensor networks
wireless sensor based security system
smart system
Smart security
smart routing
sensors
security
Safety
Radar vision
Radar tracking
radar imaging
pubcrawl
Mobile Technology
capacitive sensing
Mobile Applications
Mobile Application
IoT based smart security system
Internet of Things
internal security
Intelligent sensors
external security
Cryptography
computational intelligence
Compositionality
composability
capacitive sensors
biblio
A trust-based security enforcement in disruption-tolerant networks
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
security enforcement
mobile computing
network participants
Peer-to-peer computing
privacy
pubcrawl
Routing protocols
security
security credentials
Medical services
security of data
subjective logic
telecommunication security
trust model
trust-based security enforcement
Trusted Computing
uncertainty
web of trust
delay tolerant networks
authentication
authorisation
central trusted entity
centralised trusted authorities
composability
Compositionality
computational intelligence
Cryptography
attribute-based access control
Delay-tolerant networks
delays
disruption- and delay-tolerant networks
disruption-tolerant networks
DTN
high packet drop rates
long delays
biblio
Intelligent security lock
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
intrusion detection system
software system
smart electronic/digital door locking system
Smart Door Lock
security features
Resiliency
resilience
real time camera surveillance
pubcrawl
mobile computing
Mobile app
message authentication
lock device
Live Camera Feeds
keys (locking)
Bluetooth
intrusion detection notification
Intrusion Detection
Intelligent Security Lock prototype
human factor
Human behavior
face recognition
doors
Conferences
comprehensive security requirements
composability
Cameras
bluetooth security
Bluetooth Lock
authentication
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »