Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
security
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
low power consumption
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
ARM hardware virtualization technique
kernel-level memory data
kernel privilege
kernel level attack
Kernel
IoT devices
Internet of Things
hypervisor privilege
Human behavior
Hardware
hardened memory data protection framework
H-Securebox system
embedded systems
data privacy
composability
ARM Hypervisor
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
Categorical Classification and Deletion of Spam Images on Smartphones Using Image Processing and Machine Learning
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
machine learning
whatsapp
unsolicited e-mail
spam images
social networking (online)
Smartphones
smart phones
Scalability
pubcrawl
privacy
Optical character recognition software
mobile device
mobile computing
media exchange
manual deletion
categorical classification
learning (artificial intelligence)
Image Processing
image classification
Histograms
feature extraction
Facebook
face recognition
Face
exponential rate
Electronic mail
data deletion
communication apps
classification
categorical deletion
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
Smart bluetooth low energy security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
smart phones
PSoC 4 BLE
pubcrawl
resilience
Resiliency
security
sensors
Servomotors
smart Bluetooth low energy security system
physical lock
smartphone
surveillance system
system-on-chip
Web page
Web site
wireless connection
wireless technologies
BLE (Bluetooth Low Energy)
low energy consumption security system
IoT (Internet of Things)
image transmission
human factor
Human behavior
energy security
energy consumption
Conferences
composability
Cameras
building management systems
bluetooth security
Bluetooth
BLE technology
biometric
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Towards accessible mobile pattern authentication for persons with visual impairments
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
smart phones
pattern locks
pressure gradient input
pubcrawl
resilience
Resiliency
Scalability
security
security applications
pattern lock
smartphone
Smartphones
touch sensitivity
usage scenario
user interface related issues
user preferred color combination
visual impairments
Visually Impaired
graphical user interfaces
accessible mobile pattern authentication
accessible security application
Android users
authentication
authentication strength
authorisation
color blind users
complex design
access barrier
handicapped aids
Human behavior
Image color analysis
inaccessible design
Mobile communication
mobile computing
mobile locks
password
biblio
SysPal: System-Guided Pattern Locks for Android
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
pattern locks
usability
system-guided pattern locks
SysPal policies
smart phones
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Android pattern lock
Password selection policy
password
mobile computing
Meters
Markov processes
Humanoid robots
Human behavior
Androids
Android screen lock patterns security
biblio
DepSys: Dependency aware integration of cyber-physical systems for smart homes
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
DepSys
XML
water supply
utility sensing infrastructure
system interdependency problems
smart phones
Smart homes
physical world entities
home computing
Energy resolution
Electricity supply industry
actuation infrastructure
dependency aware system integration
dependency
cyber-physical systems
CPS applications
control
Containers
Conflict Resolution
conflict detection
Availability
actuators
1536086
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »