Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
Mobile augmented reality based on cloud computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
image preprocessing
transmission cost reduction
smart phones
Servers
Scalability
resilience
rendering (computer graphics)
pubcrawl
privacy
performance evaluation
Mobile handsets
mobile device
mobile computing
mobile augmented reality rendering system
image resizing
Android smart phone
image matching
image corner detection
image capturing
Human behavior
feature comparisons
fast corner detection
edge detection
Databases
Cloud Computing
Chunghwa Telecoms hicloud
Cameras
Books
book spine matching
augmented reality
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
ARMv8-A processor
application programming interface
tablets
suspected Flush+Reload
static code analysis schemes
secure collaborative API
obfuscation techniques
mobile phones
Flush+Reload attack
Flush+Flush cache attacks
Flush+Flush attack
flush operation API
Collabo rative API
security of data
ARMv8 A
Compositionality
application program interfaces
APIs
program diagnostics
performance evaluation
cache storage
mobile computing
microprocessor chips
Resiliency
resilience
pubcrawl
biblio
FireBugs: Finding and Repairing Bugs with Security Patterns
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
program debugging
Software systems
software quality
software maintenance
software design experience
software defects
security patterns
security of data
security bugs
security
Secure Software Development
Resiliency
resilience
repairing bugs
pubcrawl
Automated Secure Software Engineering
mobile computing
javax.crypto APIs
firebugs
Cryptography
Compositionality
Bug Repair
automated approach
application programming interface
application program interfaces
APIs
Android app repositories
Android (operating system)
composability
biblio
BenchPress: Analyzing Android App Vulnerability Benchmark Suites
Submitted by grigby1 on Fri, 08/14/2020 - 11:43am
Android security analysis tools
application programming interface
UBCBench
tool developers
temperature 227.0 K
stack overflow
security-related APIs
Representativeness
ICCBench
Ghera
Empirical Software Engineering
DroidBench
BenchPress
benchmark
Android-specific benchmark suites
security of data
Android app vulnerability benchmark suite analysis
Android app development
Android (operating system)
evaluation
android
Compositionality
application program interfaces
APIs
mobile computing
Resiliency
resilience
pubcrawl
security
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Invited Paper: AI-Based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies
Submitted by grigby1 on Thu, 08/13/2020 - 5:08pm
malicious participants
AI-based security design
artificial intelligence-based security solutions
denial of service
distributed sensing paradigm
energy-oriented DoS attack
Ensemble Techniques
illegitimate task requests
location-based DoS attack
Mobile handsets
MCS servers
MCS task legitimacy decisions
Mobile Crowdsensing
mobile crowdsensing systems
pointless energy consumption
smart mobile devices
artificial intelligence security
telecommunication security
learning (artificial intelligence)
security of data
security
machine learning
Servers
Artificial Intelligence
pubcrawl
computer network security
Internet of Things
batteries
privacy
sensor fusion
mobile computing
sensors
Denial of Service attacks
Task Analysis
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »