Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile devices
biblio
Mobile First?: Understanding Device Usage Practices in Novel Content Sharing Services
Submitted by grigby1 on Thu, 05/18/2017 - 1:27pm
Compositionality
content sharing
design guidelines
device selection criteria
device usage practices
expandability
mobile devices
online sharing services
privacy management
pubcrawl
Resiliency
biblio
An Evaluation of One-Class and Two-Class Classification Algorithms for Keystroke Dynamics Authentication on Mobile Devices
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
keystroke dynamics authentication
two-class classification algorithms
Training
touchscreen
touch sensitive screens
touch screen based devices
pubcrawl170115
pattern classification
one-class classification algorithms
one-class classification
Mobile handsets
mobile devices
mobile computing
mobile authentication
Android (operating system)
keystroke dynamics
Keyboards
feature extraction
Error analysis
equal error rate
EER
biometrics (access control)
biometrics
authorisation
authentication test-framework
authentication
Android devices
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 1:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 11:12am
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 1:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
biblio
Entity title architecture extensions towards advanced quality-oriented mobility control capabilities
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
mobile computing
wireless quality conditions
wireless communication systems
Wireless communication
Streaming media
session quality requirements
quality of service
point of attachment decision
PoA candidates
PoA
networking functions
Multimedia communication
mobility management (mobile radio)
mobile multimedia networking
Mobile handsets
mobile devices
active session flows
MATLAB
Manganese
internet
information-centric entity title architecture
handover setup
Handover
future Internet clean slate approach
FI
ETArch
entity title architecture extensions
distinct applications scenario
delays
beyond-IP networking services
advanced quality-oriented mobility control capabilities
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »