Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile Security
file
Safeguarding Mobile Cloud Services New Challenges and Solutions
Submitted by XiaoFeng Wang on Wed, 01/08/2020 - 3:18pm
Project Slides
Software
Systems
Cloud Security
Mobile Security
IoT security
1618493
SaTC PI Meeting 2019
biblio
How Do We Talk Ourselves Into These Things?
Submitted by grigby1 on Thu, 01/02/2020 - 1:42pm
biometrics
empirical study
expert systems
Human Factors
mobile authentication
Mobile Security
privacy
pubcrawl
Scalability
biblio
iOracle: Automated Evaluation of Access Control Policies in iOS
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
Access Control
composability
Control Theory
ios
iPhone
Mobile Security
policy modeling
pubcrawl
resilience
Resiliency
security
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 9:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 9:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
Submitted by grigby1 on Thu, 01/31/2019 - 11:17am
Mobile Security
Switches
strong coercive multisnapshot adversaries
storage medium
smart phones
side-channel attacks
side channel attack
Scalability
Resiliency
resilience
pubcrawl
practical plausibly deniable encryption system
plausibly deniable encryption
PDE schemes
password
Multi snapshot Adversary
Android (operating system)
mobile device
MobiCeal
Metrics
LG Nexus 4 Android phone
Human Factors
Human behavior
fast switching
encryption
dummy write
decrypt data
Cryptography
block-based file systems
android encryption
Android 4.2.2
biblio
Studying TLS Usage in Android Apps
Submitted by grigby1 on Thu, 01/31/2019 - 11:16am
resilience
Transport Layer Security
Transport Layer Protocols
TLS
SSL
security protocols
Secure Sockets Layer
Scalability
Resiliency
android
pubcrawl
network measurements
Mobile Security
mobile
Metrics
Human Factors
Human behavior
android encryption
biblio
AEON: Android Encryption Based Obfuscation
Submitted by grigby1 on Thu, 01/31/2019 - 11:15am
android encryption
Android security
Human behavior
Human Factors
Metrics
Mobile Security
obfuscation
pubcrawl
resilience
Resiliency
Scalability
software security
biblio
Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication
Submitted by grigby1 on Mon, 01/21/2019 - 11:28am
Acoustic Fingerprints
composability
Human behavior
Mobile Security
pubcrawl
Resiliency
speaker and microphone fingerprinting
two-factor authentication
usability
« first
‹ previous
1
2
3
4
5
6
next ›
last »