Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile devices
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 11:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Big Data Source Location Privacy and Access Control in the Framework of IoT
Submitted by grigby1 on Tue, 02/06/2018 - 1:42pm
IoT
Servers
security
Scalability
Resiliency
pubcrawl
Protocols
privacy
Policy
mobile devices
Metrics
location
Access Control
Internet of Things
Human Factors
generator objects
encryption
data privacy
Data models
Cryptography
big data source location privacy
big data privacy
Big Data
biblio
Infrasonic scene fingerprinting for authenticating speaker location
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
scene recognition rates
Infrasound
localization
mobile computing
mobile devices
Mobile handsets
pubcrawl
Resiliency
robust navigation cues
infrasonic signatures
smartphone recordings
Smartphones
smart phones
speaker recognition
standard smartphone recording
Training
ultra-low frequency cues
feature extraction
Acoustic Filtering
Acoustic Fingerprints
ambient infrasound
authenticating speaker location
authentication
Cepstral analysis
classifier
composability
acceleration-based cepstral features
feature set analysis
fingerprint identification
frequency ranges
human auditory range
Human behavior
infrasonic region
infrasonic scene fingerprinting
biblio
Location privacy preserving protocols in database-enabled cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
Resiliency
wireless users
wireless spectrum
wireless services
Wireless communication
traffic redirection
telecommunication traffic
telecommunication security
SU location privacy
SU
spectrum utilization
spectrum availability
spectral availability
secondary users
Schedules
cognitive radio
pubcrawl
Protocols
privacy
mobile devices
master device enabled location privacy preserving scheme
location privacy preserving protocols
geolocation database
Databases
database enabled wireless networks
database enabled cognitive radio networks
data privacy
crowd sourced location privacy preserving scheme
Communication system security
Cognitive Radio Security
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
See You Next Time: A Model for Modern Shoulder Surfers
Submitted by grigby1 on Tue, 05/30/2017 - 12:55pm
authentication
collaboration
composability
Human behavior
Insider Threats
Metrics
mobile devices
peer to peer security
pubcrawl
Resiliency
Scalability
shoulder surfing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »