Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android
biblio
Real Time Android Ransomware Detection by Analyzed Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
program diagnostics
android encryption
static method
realtime variant ransomware detection
realtime unknown ransomware detection
realtime new ransomware detection
real-time detection
real-time Android ransomware detection
PC environment
New/Variant/Unknown Ransomware
dynamic method
analyzed Android applications
Metrics
Android (operating system)
android
Monitoring
static analysis
Entropy
smart phones
Ransomware
pubcrawl
Human behavior
Resiliency
real-time systems
mobile computing
invasive software
encryption
Cryptography
Scalability
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Security in iOS and Android: A Comparative Analysis
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
permission analysis
ios
hybrid mobile application
Apache Cordova
iOS (operating system)
security features
Permission
Compositionality
user privacy
mobile devices
Android (operating system)
security of data
Human Factors
internet
Metrics
privacy
pubcrawl
Resiliency
mobile computing
Kernel
security
Hardware
data privacy
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 12:03pm
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 11:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »