Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile devices
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
biblio
Pose-Assisted Active Visual Recognition in Mobile Augmented Reality
Submitted by grigby1 on Fri, 02/22/2019 - 4:12pm
active visual recognition
augmented reality
Human behavior
mobile devices
privacy
pubcrawl
Resiliency
Scalability
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
mobile radio
wireless mesh networks
Wireless communication
Ultra-fast handoff authentication protocol
UFAP
trust-based
token-based authentication protocol
token-based
ticket-based
telecommunication security
Servers
resilience
pubcrawl
Protocols
mobility management (mobile radio)
authentication
mobile devices
Metrics
IEEE 802.11s
id-based
handoff authentication protocol
Handoff
extensible authentication protocol
EAP-TLS
EAP-PEAP
delays
Cryptography
Cryptographic Protocols
composability
Communication system security
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Processing of Crowd-sourced Data from an Internet of Floating Things
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
bathymetry interpolation
Cloud Computing
data crowd sourcing
gpu
Internet of Things
Metrics
mobile devices
pubcrawl
Resiliency
Scalability
Underwater Networks
workflow
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »