Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Security
biblio
Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles
Submitted by grigby1 on Fri, 05/12/2023 - 10:10am
autonomous vehicles
computer science
controller area network
Human behavior
Human Factors
Intrusion Detection
Mobile Security
network security
Neural networks
pubcrawl
resilience
Resiliency
security
Smart Grids
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 4:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
biblio
SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning
Submitted by aekwall on Fri, 03/31/2023 - 9:36am
documentation
Web Vulnera-bility Scanner
web security
web applications
security testing
pentesting
OWASP
DVWA
Mobile Security
application security
security
Prototypes
Black Box Attacks
machine learning
composability
Resiliency
Metrics
pubcrawl
information security
biblio
A Survey on Mobile Malware Detection Methods using Machine Learning
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
malware
mobile malware
dynamic malware detection
iOS Security
Traffic detection
Mobile communication
Mobile Security
operating systems
Compositionality
machine learning
Runtime
telecommunication traffic
Conferences
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
Compositionality
SIM card based authentication
mobile network operator
cellular network
passwords
iOS Security
Mobile Security
fault diagnosis
Pipelines
malware
security
Registers
Cellular networks
authentication
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
Fine Grained Confinement of Untrusted Third-Party Applications in Android
Submitted by grigby1 on Fri, 08/26/2022 - 1:28pm
Mobile Applications
Third Party Applications
SE-Android
Internet telephony
AOSP
Mobile Security
confinement
spyware
Intelligent systems
cyber security
smart phones
composability
Access Control
privacy
performance evaluation
Resiliency
resilience
pubcrawl
biblio
Detection Efficiency of Static Analyzers against Obfuscated Android Malware
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
pubcrawl
composabiity
static analyzer
signature repository
obfuscated malware
Mobile Security
mobile antivirus
malware detection efficiency
Blocklists
security
android
static analysis
malware
Detectors
Human behavior
Resiliency
Conferences
biblio
Inter-Language Static Analysis for Android Application Security
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
Conferences
tools
static analysis
pubcrawl
Mobile Security
malware
Java
Inter-language
Information systems
data-flow analysis
static code analysis
Computer Software and Theory
composabiity
Binary Analysis
application security
android
Resiliency
composability
Human behavior
biblio
The Influence of Mobile Operating Systems on User Security Behavior
Submitted by grigby1 on Fri, 07/29/2022 - 5:14pm
operating systems
User behavior
technology threat avoidance theory
Stakeholders
Resiliency
resilience
pubcrawl
privacy
Operating systems security
iOS Security
operating system
Mobile Security
ios
Cryptography
Conferences
appraisal
android
biblio
A Suggested Model for Mobile Application Penetration Test Framework
Submitted by grigby1 on Thu, 07/28/2022 - 2:07pm
iOS Security
Analytical models
composability
dynamic analysis
Heuristic algorithms
Human behavior
Hybrid Analysis
information security
Mobile Security
operating systems
pubcrawl
resilience
Resiliency
security
social networking (online)
static analysis
1
2
3
4
5
6
next ›
last »