Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
Mobile Security
Switches
strong coercive multisnapshot adversaries
storage medium
smart phones
side-channel attacks
side channel attack
Scalability
Resiliency
resilience
pubcrawl
practical plausibly deniable encryption system
plausibly deniable encryption
PDE schemes
password
Multi snapshot Adversary
Android (operating system)
mobile device
MobiCeal
Metrics
LG Nexus 4 Android phone
Human Factors
Human behavior
fast switching
encryption
dummy write
decrypt data
Cryptography
block-based file systems
android encryption
Android 4.2.2
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
biblio
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
private key cryptography
Internet of Things
key agreement
key agreement protocol
low key generation rate
Mobile handsets
Nexus 5X
Nexus 6P
physical response interval
pre-built fingerprint database
Human behavior
pubcrawl
redundancy time cancellation
Resiliency
secure key agreement
security
smart phones
symmetric key
telecommunication security
composability
acoustic communication
Acoustic Fingerprints
Acoustics
authentication
bidirectional initial authentication
coding scheme
commercial mobile devices
commodity mobile devices
commodity smartphones
acoustic channel response
Cryptographic Protocols
device authentication
Device-to-device communication
encoding
fast device authentication
fast signal detection
GeneWave
Hardware
biblio
Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
human computer interaction
word recognition procedure
ubiquitous computing
smartphone sensing
smartphone microphone
smart phones
sensors
Semantics
semantic features
Resiliency
pubcrawl
microphones
keystroke sensing
Keyboards
human computer operation recognition
human computer operation
acoustic features
Human behavior
Games
fingerprint identification techniques
fingerprint identification
Feature fusion
feature extraction
determined keystrokes
Context-aware services
computer keyboard
composability
classification model
Activity Recognition
Acoustics
Acoustic Fingerprints
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »