Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Security
biblio
Information System Audit for Mobile Device Security Assessment
Submitted by grigby1 on Fri, 04/01/2022 - 12:33pm
Task Analysis
Security Audits
mobile device
Information System Management
bring your own device
audit
BYOD
Mobile Security
Mobile handsets
pubcrawl
Business
Information systems
Cybersecurity
Guidelines
Scalability
Resiliency
resilience
Human behavior
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 11:17am
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 1:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
Mobile security labware with smart devices for cybersecurity education
Submitted by grigby1 on Tue, 05/25/2021 - 1:35pm
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
Educational institutions
labware
Mobile communication
Mobile Security
privacy
pubcrawl
smart mobile device
smart phones
biblio
Providing an Experiential Cybersecurity Learning Experience through Mobile Security Labs
Submitted by grigby1 on Wed, 11/04/2020 - 1:02pm
mobile security labs
vulnerable applications
university settings
STEM topic
Software
security of data
Security Labs
security education
secure Android apps
public set
pubcrawl
privacy
practical labs in security for mobile applications
Plasmas
PLASMA
Androids
Mobile Security
Mobile Education
mobile computing
experiential cybersecurity learning experience
educational security labs
Educational institutions
educational courses
education
cybersecurity professionals
cybersecurity education
cyber physical systems
computing courses
computer aided instruction
biblio
Forensic Analysis of Third Party Location Applications in Android and iOS
Submitted by grigby1 on Thu, 07/30/2020 - 1:33pm
operating systems
mobile forensics
location services
application analysis
iOS Security
Mobile Security
Global Positioning System
Humanoid robots
Androids
Forensics
tools
Compositionality
Metrics
smart phones
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices
Submitted by grigby1 on Thu, 07/30/2020 - 1:32pm
Mobile Security
APP-related information
iMonitor
iOS (operating system)
iOS 9+
iOS devices
labeling system
Mobile app
mobile network
mobile network traffic
APP-level traffic monitoring
mobile traffic monitoring
network monitor
NetworkExtension framework
privacy leakage detection
traffic classification methods
traffic label
User profiling
user-related information
iOS Security
smart phones
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
mobile computing
Monitoring
sensors
Metrics
Virtual private networks
Compositionality
traffic engineering computing
ios
.pcap files
APP labels
profile
Honggang Wang
CPS Domains
CPS Technologies
computer architecture
wireless networks
Mobile Security
wireless sensor neteworks
computer systems
Massachusetts
biblio
Assisting the Development of Secure Mobile Apps with Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
natural language processing
user privacy protection
tools
secure mobile apps development
Scalability
Resiliency
recommender systems
rapid growth
pubcrawl
Androids
Mobile Security
mobile devices
mobile computing
largest worldwide market share
Humanoid robots
Human behavior
data privacy
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
« first
‹ previous
1
2
3
4
5
6
next ›
last »