Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
A Data Hiding Approach for Sensitive Smartphone Data
Submitted by grigby1 on Tue, 08/22/2017 - 10:54am
digital signal processing
Human behavior
Mobile and Wireless Security
pervasive computing
Privacy Protections
pubcrawl
Resiliency
Scalability
Smartphones
ubiquitous computing
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 11:56am
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 11:31am
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 7:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 1:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
Do you think your passwords are secure?
Submitted by BrandonB on Mon, 05/04/2015 - 12:13pm
encryption
usability
ubiquitous computing
ubiquitous access
security-critical application
password security
mobile device
message authentication
key derivation function
Humanoid robots
Android password-manager
direct decryption
Databases
Cryptography
cryptographic key
bruteforce attack
authorisation
authentication
Androids
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
M2M technologies: Enablers for a pervasive Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
Communications technology
Conferences
context-awareness
European FP7 project BUTLER
Internet of Things
Internet of Things security
M2M service layer standardization
M2M technology
pervasive Internet of Things
security
Smart homes
Telecommunication standards
ubiquitous computing
Wireless communications
biblio
A novel trust evaluation method for Ubiquitous Healthcare based on cloud computational theory
Submitted by BrandonB on Thu, 04/30/2015 - 12:33pm
Pragmatics
user profile attributes
uncertainty handling
uncertain reasoning
UH environment
ubiquitous healthcare
ubiquitous computing
TV
Trusted Computing
trust evaluation method
cloud computational theory
MIMICs
Medical services
MATLAB software
MATLAB
health care
Generators
Conferences
cloud theory
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »