Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
Proposed security by IDS-AM in Android system
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
intrusion detection system
smart phones
security of data
Resiliency
resilience
Monitoring
mobile systems
mobile environment
mobile computing
mobile agents
malware
malicious behavior
pubcrawl
Intrusion Detection
IDS-AM
IDS
feature extraction
Data mining
composability
attacks
Android system
Android OS
android
biblio
Human Trust in Robots When Performing a Service
Submitted by grigby1 on Tue, 12/01/2020 - 12:34pm
pubcrawl
trust robots
trust
team working
smart phones
robust trust
robotic personal assistants
Robot Trust
Robot teams
Resiliency
resilience
Radio frequency
collaboration
multi-robot systems
mobile computing
human-robot interaction
Human Robot Interaction
human perceptions
human participants
Human Factors
Human behavior
framework
Conferences
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Androids
Operating systems security
system call analysis
malware game system calls
malicious gaming applications
malicious games
detection system
cloning applications
benign game system calls
Android operating systems
Android gaming malware detection system
Android Gaming Malware
computer games
Android (operating system)
Humanoid robots
Monitoring
resilience
Games
dynamic analysis
program diagnostics
invasive software
malware
Cloning
smart phones
mobile computing
composability
Resiliency
Metrics
pubcrawl
biblio
Mobile bootloader with security features
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
program testing
Operating systems security
software design
security features
modern mobile operating systems
mobile development
mobile bootloader
excessive information
device internal storage
described problem
bootloading stage
bootloader
Booting
Software Testing
security of data
operating systems (computers)
resilience
software engineering
computer security
smart phones
mobile computing
composability
information security
Cryptography
Resiliency
Metrics
pubcrawl
system logs
biblio
Providing an Experiential Cybersecurity Learning Experience through Mobile Security Labs
Submitted by grigby1 on Wed, 11/04/2020 - 1:02pm
mobile security labs
vulnerable applications
university settings
STEM topic
Software
security of data
Security Labs
security education
secure Android apps
public set
pubcrawl
privacy
practical labs in security for mobile applications
Plasmas
PLASMA
Androids
Mobile Security
Mobile Education
mobile computing
experiential cybersecurity learning experience
educational security labs
Educational institutions
educational courses
education
cybersecurity professionals
cybersecurity education
cyber physical systems
computing courses
computer aided instruction
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »