Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
keystroke dynamics authentication
two-class classification algorithms
Training
touchscreen
touch sensitive screens
touch screen based devices
pubcrawl170115
pattern classification
one-class classification algorithms
one-class classification
Mobile handsets
mobile devices
mobile computing
mobile authentication
Android (operating system)
keystroke dynamics
Keyboards
feature extraction
Error analysis
equal error rate
EER
biometrics (access control)
biometrics
authorisation
authentication test-framework
authentication
Android devices
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Affect-preserving privacy protection of video
Submitted by grigby1 on Wed, 03/08/2017 - 1:12pm
pubcrawl170113
wireless networks
Visual privacy protection
video signal processing
video applications
Three-dimensional displays
social sciences computing
social behaviors
Skin
Skeleton
shape deformation
Shape
security of data
security
affect-preserving privacy protection
privacy
mobile computing
mobile cameras
linear blend skinning
Image color analysis
health information
facial expression
face recognition
face image editing
Face
entertainment
data privacy
biblio
Quality of information-aware real-time traffic flow analysis and reporting
Submitted by grigby1 on Wed, 03/08/2017 - 1:06pm
pubcrawl170111
video signal processing
vehicles
vehicle count
traffic video analysis
traffic metrics
traffic information systems
Streaming media
sensors
quality of service
quality of information-aware networking
QoI
Accuracy
mobile device
mobile computing
information-aware real-time traffic flow analysis
Image edge detection
form responses
end devices
desktop workstation
Cameras
bandwidth savings
average speed
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
An effective information filtering method based on the LTE network
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
information filtering method
Training
pubcrawl170108
pubcrawl170107
network security
nearest neighbor text classification
mobile computing
minimum-risk Bayesian classification
LTE network
LTE
Long Term Evolution
learning (artificial intelligence)
KNN (Key Nearest Neighbor)
information technology
Information filters
4G LTE high-speed network
information filtering
four-level content-based information filtering
five-tuple filter
filtering theory
filtering algorithms
data analysis
content-based information filtering
content-based filter
Classification algorithms
Bayesian classification
Bayes methods
AdaBoost
4G mobile communication
4G LTE network
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 11:12am
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 1:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »