Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks
Submitted by el_wehby on Fri, 05/25/2018 - 2:48pm
Mobile communication
wireless access network
Throughput
telecommunication traffic
SRA
source-destination pair
shared relay assignment
rounding mechanism
Relays
relay networks (telecommunication)
mobile system
mobile computing
Approximation algorithms
Max-Total Throughput
Max-Min Throughput
many-to-one traffic
M21 traffic
fairness
cooperative networks
cooperative communication
close-to-optimal performance
Bismuth
approximation theory
Approximation methods
1536086
biblio
Improved approach of co-operative gray hole attack prevention monitored by meta heuristic on MANET
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
mobile computing
wireless movable nodes
telecommunication security
Security Heuristics
Scalability
Resiliency
pubcrawl
particle swarm optimization
particle swarm optimisation
network simulator
multiple gray hole attack
mobile nodes
Cooperative Gray Hole attack
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
meta heuristic
MANET
malicious node
intermediate nodes
gray hole attack prevention
data packets
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics
Submitted by K_Hooper on Wed, 05/02/2018 - 9:41am
lattice assumption
Wearable devices
sybil attacks
Resiliency
pubcrawl
patients health data
patient treatment
patient diagnosis
mobile healthcare networks analytics
mobile computing
MHN
Metrics
medical information systems
medical histories
ABS
identity privacy
health services
health care
fine-grained authentication scheme
Fiat-Shamir framework
disease treatment
disease diagnosis
digital signatures
data privacy
data analysis
composability
attribute-based signature
anonymous anti-sybil attack protocol
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Security Analysis of Bluetooth Low Energy Based Smart Wristbands
Submitted by grigby1 on Mon, 04/02/2018 - 11:54am
replay attacks
wearables security
Wearable devices
wearable computers
Trade agreements
tools
smart wristbands
smart wristband
smart watch
security of data
security
Scalability
Resiliency
resilience
Android software application
pubcrawl
privacy
mobile computing
man-in-the-middle attacks
Human behavior
Heart rate
Denial of Service attacks
brute-force attacks
bluetooth low energy
Bluetooth
Biomedical monitoring
batteries
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 11:31am
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »