Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Android encryption systems
Submitted by BrandonB on Mon, 05/04/2015 - 1:06pm
Humanoid robots
tablets
smart phones
security-critical environments
security-critical context
security-critical application scenarios
security features
RIM
platform-selection process
nonconsumer area
mobile devices
mobile device sector
Microsoft
ios
Android (operating system)
Google
encryption
device backups
Data protection
Cryptography
consumer-oriented devices
Blackerry
attack susceptibility
Apple
Androids
Android platform deployment analysis
Android encryption systems
biblio
Montage: Combine frames with movement continuity for realtime multi-user tracking
Submitted by BrandonB on Mon, 05/04/2015 - 11:59am
smart phones
Vectors
user movement vector estimation
tracking
Topology
temporal constraints
target tracking
submeter-level tracking
spatial constraints
Smartphones
Acceleration
real-time multiuser formation tracking
moving-direction estimation
movement continuity
mobile phones
meter-second-level formation tracking accuracy
Earth
Distance measurement
Acoustics
biblio
Accurate WiFi Based Localization for Smartphones Using Peer Assistance
Submitted by BrandonB on Mon, 05/04/2015 - 11:58am
peer assisted localization approach
wireless LAN
WiFi signature map
WiFi fingerprint localization
WiFi based localization method
testing
smartphone
smart phones
Servers
radionavigation
peer phones
Accuracy
Peer Assisted Localization
location based features
indoor radio
indoor localization
IEEE 802.11 Standards
Distance measurement
battery lifetime
Acoustics
acoustic ranging estimates
biblio
Authentication of k Nearest Neighbor Query on Road Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:36pm
query processing
Voronoi diagram
visual databases
third-party service provider
spatial query integrity
Spatial databases
Spatial database outsourcing
smart phones
Roads
road networks
road network k-nearest-neighbor query verification technique
Artificial Neural Networks
query authentication
outsourcing
location-based services
k nearest neighbor query
Google Android mobile devices
Generators
Euclidean space
database outsourcing paradigm
computational geometry
authentication
biblio
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
Mobile Security
Web browser
survey
Smartphones
smart phones
security of data
security
operating systems
nuts
bolts
mobile network security
mobile devices
mobile computing
Mobile communication
Internet society
internet
Computers
biblio
Dissecting Android Malware: Characterization and Evolution
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
malware
smartphone security
smart phones
representative mobile security software
representative family
Payloads
operating systems (computers)
next-generation antimobile-malware solutions
mobile malware
mobile computing
Mobile communication
mobile antivirus software
activation mechanisms
installation methods
Humanoid robots
evolution-based study
defense capability
computer viruses
carried malicious payloads
Androids
Android platform
Android malware family
Android malware
« first
‹ previous
…
10
11
12
13
14
15
16
17
18