Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
biblio
Security of Gestures Based CAPTCHAs
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
mobile devices
security.
mobile gesture CAPTCHA
gyroscopes
accelerometer
Smartphones
gestures
CAPTCHA
Accelerometers
captchas
gesture recognition
security
Mobile handsets
Security analysis
invasive software
mobile computing
composability
Software
Human behavior
pubcrawl
Servers
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
security mechanism
Usability.
sensor readings
network resources
gyroscopes
gyroscope data
gestures
gesture CAPTCHA challenge
CAPTCHA
Accelerometers
accelerometer readings
captchas
malware
usability
gesture recognition
security of data
Smartphones
mobile devices
smart phones
human computer interaction
Mobile handsets
invasive software
mobile computing
composability
performance evaluation
Human behavior
pubcrawl
Servers
security
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
A Trusted Bluetooth Performance Evaluation Model for Brain Computer Interfaces
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
mobile neurofeedback applications
brain state
brain-computer interfaces
Cyber Physical System
electroencephalography
fitness tracking
medical signal processing
mobile BCI technology
Mobile Cyber Security
mobile EEG-based BCI applications
brain function classification accuracy
neurophysiology
Performance Rating
system-on-chip
telemedicine
TMBCI
Trusted Mobile BCI Performance
Wearable
bluetooth security
cyber physical systems
data privacy
privacy
mobile computing
pubcrawl
composability
Resiliency
resilience
Human behavior
security
feedback
Bluetooth
ambulatory care
BCI hardware performance
BCI Safety
Bluetooth operating parameters
brain computer interface
brain computer interfaces
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 4:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »