Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
NFC Unlock: Secure Two-Factor Computer Authentication Using NFC
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
record keeping
Near Field Communication technology
near-field communication
NFC
NFC authentication
NFC unlock
passcode
pGina
pubcrawl
Near Field Communication
resilience
Resiliency
secure multifactor authentication system
SMS code
standard Windows credentials
telecommunication computing
text alerts
two-factor computer authentication
human factor
authentication
authorisation
Cryptography
C\#
C\# language
C\# languages
encryption
Human behavior
advanced encryption standard
Human Factors
login attempts
message authentication
Metrics
mobile computing
multifactor authentication
Multiple-factor Authentication
biblio
Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
privacy
Measurement
mKDCA feature-map
mobile computing
mobile sensing
multi-kernel learning
multikernel discriminant-component selection
multiple Kernel Discriminant Component Analysis feature-map
Mutual information
pattern classification
machine learning
privacy-aware classification
privacy-preserving classification
pubcrawl
Redundancy
resilience
Resiliency
Scalability
utility classification performance
Human behavior
Artificial Intelligence
Compressive Privacy
data privacy
Differential mutual information
Differential Mutual Information (DMI)
DMI forward search method
feature engineering
Fisher's discriminant analysis
high-quality predictor
AI
human factor
Human Factors
incremental forward search
Kernel
Kernel Discriminant Component Analysis (KDCA)
kernel selection
Kernels
learning (artificial intelligence)
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
Real time car parking system: A novel taxonomy for integrated vehicular computing
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
mobile cloud
content delivery services
data dissemination
data-disseminated real-time services
distributed computing
distributed remote cloud
fog-edge computing
GH-311RT ultrasonic distance sensor
ICCP prototype testbed
improper parking management scheme
Infrastructure-to-Vehicle
integrated communication-computing platforms
integrated vehicular computing
LinkSprite 2MP UART JPEG camera module
connected Vehicular Clients
networked fog centers
parking lot
real-time cloud
road side sensor based monitoring
self-energized Fog nodes/data centers
SHARP 2Y0A21 passive infrared sensor
smart car parking management
smart car parking system
time car parking system
Traffic congestion
Vehicular cloud
vehicular network
vehicular networking
real-time systems
Metrics
cyber physical systems
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
home automation
Cloud Computing
vehicular ad hoc networks
Roads
mobile computing
sensors
security
traffic engineering computing
Fog computing
radiofrequency identification
transport protocols
automobiles
Urban areas
Internet of Vehicles
automated vehicular cloud computing
Cameras
cellular radio
Cloud Convolution
cloud virtual machine scalability
connected VCs
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
Adaptable Safety and Security in V2X Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
security threats
performance limitation threats
pubcrawl
Resiliency
road safety
road traffic
Roads
Safety
security
network conditions
simple V2V highway scenario
telecommunication security
telecommunication traffic
traffic efficiency
V2X systems
vehicular ad hoc networks
Wireless communications
adaptability
mobile computing
Metrics
maximum safety
Internet of Vehicles
internet
infotainment
Human Factors
Human behavior
dynamic adaptability approach
cyber physical systems
connected vehicles
Brakes
automobiles
authentication
adaptive safety/security approach
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
Hosting distributed databases on internet of things-scale devices
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
Resiliency
pervasive computing
Pervasive Computing Security
physical devices
processing workload
pubcrawl
racked servers
Random access memory
Raspberry Pi
performance evaluation
Scalability
security
sensor nets
storage
system resiliency
testing
virtual machines
Virtual machining
Internet of Things
Cassandra distributed database
computation power
decentralized architecture
Distributed databases
distributed device deployment
Hardware
Human Factors
interconnected devices
benchmarks
Internet of Things-scale devices
IoT nodes
IoT representative devices
IoT-representative device specifications
Metrics
mobile computing
network compression
node configuration
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »