Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android
biblio
Study of Security Weaknesses in Android Payment Service Provider SDKs
Submitted by enck on Fri, 07/01/2022 - 8:53am
mobile payment security
program analysis
android
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2022: April
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 10:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Internet of Things (IoT) Based Door Lock Security System
Submitted by aekwall on Fri, 04/01/2022 - 1:05pm
Predictive Metrics
Scientific Computing Security
security system
mobile
Internet of Things (IoT)
scientific computing
Arduino
information management
android
privacy
Mobile Applications
wireless networks
Prototypes
Compositionality
Resiliency
pubcrawl
Pins
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 3:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
biblio
Cloud based mobile application security enforcement using device attestation API
Submitted by aekwall on Tue, 01/25/2022 - 2:48pm
web services
STRID
SafetyNet
Mobile OS
mobile
Google Play Services
education
attestation
android
Mobile handsets
Computational modeling
Mobile Applications
composability
Human behavior
Resiliency
pubcrawl
rest
Analytical models
Cloud Computing
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 11:17am
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
iOS Security
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
android
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 11:17am
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 11:16am
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
Analysis and Detection of Android Ransomware for Custom Encryption
Submitted by grigby1 on Mon, 01/10/2022 - 11:15am
android
android encryption
API
Bait file
Conferences
custom encryption
encryption
Entropy
Human behavior
information entropy
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Scalability
biblio
CRYLOGGER: Detecting Crypto Misuses Dynamically
Submitted by grigby1 on Mon, 12/20/2021 - 10:29am
Hash functions
tools
security
Resiliency
resilience
pubcrawl
privacy
Misuses
internet
Heuristic algorithms
android
encryption
Cryptography
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »