Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Android Malware Family Classification Based on Sensitive Opcode Sequence
Submitted by grigby1 on Thu, 10/29/2020 - 11:09am
malware classification
sensitive semantic feature-sensitive opcode sequence
sensitive opcode
sensitive API
semantic related vector
Semantic
Resiliency
resilience
pubcrawl
privacy
pattern classification
oversampling technique
multiple class classification
mobile computing
Metrics
Android (operating system)
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
Drebin dataset
Digital Forensics
code specific semantic information
application program interfaces
Android malware forensics
Android malware family classification model
Android Malware Detection
Android malware analysis
Android malware
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
data tampering
Linux Operating System Security
Universal Serial Bus
software portability
security and privacy
portability
permanent record deletion
operating systems
operating system security flaws
live Linux distribution device
Live Devices
live device attacks
Linux operating system
security of data
Insider Threats
Predictive Metrics
File systems
microsoft windows
data theft
Metrics
composability
pubcrawl
Resiliency
Linux
mobile computing
security
biblio
A User-centred Design Approach for Mobile- Government Systems for the Elderly
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
successful-government systems
pubcrawl
qualitative research methods
quantitative research methods
resilience
Resiliency
security
Senior citizens
Statistics
policy-based governance
technology acceptance model
usability
user acceptance
user centred design
user group
user-centred design approach
user-driven method
user-friendliness
IGUAN framework
collaboration
Cybersecurity
E-Government
e-government services
Electronic government
government data processing
governmental services
Human Factors
acceptance
important benefits
key acceptance factors
m-government for elderly
m-Government prototype
mobile computing
mobile government systems
mobile-government systems
biblio
Quick and Accurate False Data Detection in Mobile Crowd Sensing
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
MCS
wireless sensor networks
SVD
Sparse matrices
Smartphones
singular value decomposition
sensors
sensor fusion
Roads
Resiliency
resilience
pubcrawl
Monitoring
mobile crowd sensing
mobile computing
approximation theory
Matrix Separation
Matrix decomposition
Matrix converters
low-rank matrix approximation
LightLRFMS
light weight low rank and false matrix separation algorithm
Iterative methods
iteration process
Human behavior
False Data Detection
DRMF
direct robust matrix factorization
cyber physical systems
composability
biblio
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
electronic messaging
Human Behavior and Cybersecurity
SMSBotHunter
SMS stealer botnets
SMS spammer botnets
SMS botnet
one-class classification
mobile botnets
detect SMS botnets
SMS messages
dynamic analysis
anomaly detection technique
Anomaly Detection
botnet
Training
internet
Cryptography
Mobile handsets
pubcrawl
Human behavior
feature extraction
mobile computing
invasive software
malware
Servers
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Research and Implementation of Mobile Application Security Detection Combining Static and Dynamic
Submitted by aekwall on Mon, 10/05/2020 - 11:54am
automated platform for security detection of mobile application system
Dynamic Networks and Security
server security detection
security detection of mobile application
security detection combining static and dynamic
Packaging
mobile intelligent terminals trend
mobile application traffic
mobile application security detection
mobile application client
fuzzy testing method
client security detection
capture mobile application traffic
security of data
Engines
Fingerprint recognition
Mobile Applications
client-server systems
internet
Metrics
composability
pubcrawl
Resiliency
mobile computing
security
Servers
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »