Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
SIMON Lightweight Encryption Benchmarking on Wireless Aquascape Preservation
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
remote Android smartphone
Arduino controller
autonomous aquascape preservation system
DS18B20 sensor
engineering technique
Human-computer interaction
instance aquascaping
leisure activities
pervasive computing
aquascape temperature
SIMON lightweight cryptography
SIMON lightweight encryption
SIMON lightweight encryption benchmarking
unauthorized party
wireless aquascape preservation system
wireless communication channel
android encryption
security of data
aquascape
Android graphical user interface application
Metrics
graphical user interfaces
communication technology
user experience
user interfaces
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
telecommunication security
Cryptography
Scalability
biblio
Overprivileged Permission Detection for Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
Data mining
android encryption
permission mechanism
overprivileged permission detection
frequent item set mining
Droidtector
App protection technology
Android system
smartphone
Metrics
Android applications
Android (operating system)
Cameras
security of data
smart phones
tools
privacy
Google
pubcrawl
Human behavior
Resiliency
privacy leakage
mobile computing
data privacy
encryption
Scalability
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
Real Time Android Ransomware Detection by Analyzed Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
program diagnostics
android encryption
static method
realtime variant ransomware detection
realtime unknown ransomware detection
realtime new ransomware detection
real-time detection
real-time Android ransomware detection
PC environment
New/Variant/Unknown Ransomware
dynamic method
analyzed Android applications
Metrics
Android (operating system)
android
Monitoring
static analysis
Entropy
smart phones
Ransomware
pubcrawl
Human behavior
Resiliency
real-time systems
mobile computing
invasive software
encryption
Cryptography
Scalability
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
HOTSPOT: Crossing the Air-Gap Between Isolated PCs and Nearby Smartphones Using Temperature
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
HOTSPOT
air-gapped PCs
airgap crossing technique
Android (operating system)
Android app
covert-channels
CPUs
exfiltration
GPUs
air-gapped computers
isolated PCs
nearby smartphone
temperature
thermal
thermal pings
thermal sensing
thermal signals
pubcrawl
air-gap covert communication channels
air-gap
Air gaps
Information Leakage
Smartphones
smart phones
resilience
Metrics
mobile computing
composability
internet
computer network security
Resiliency
Human Factors
Human behavior
biblio
Recognizing Driver Talking Direction in Running Vehicles with a Smartphone
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
direction-of-arrival estimation
Acoustic Fingerprints
time-of-arrival estimation
talking status identification
speech signal
Source separation
safety enhancement
recognition
phone placements
multipath effects
microphones
in-vehicle environment
fingerprint based sound source localization approaches
driver talking direction recognition
Driver Talking Direction
driver distraction
road safety
channel fingerprint extraction
Acoustic signal processing
driver information systems
signal classification
classification accuracy
fingerprint
speech processing
Human Factors
smartphone
smart phones
composability
pubcrawl
Human behavior
Resiliency
biblio
Forensic Analysis of Third Party Location Applications in Android and iOS
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
operating systems
mobile forensics
location services
application analysis
iOS Security
Mobile Security
Global Positioning System
Humanoid robots
Androids
Forensics
tools
Compositionality
Metrics
smart phones
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Privacy Mining of Large-scale Mobile Usage Data
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
machine learning tools
android
mobile devices
ios
iOS (operating system)
mobile network
privacy leakage detection
iOS Security
iOS system
inference mechanisms
mobile privacy leakage
mobile traffic data
mobile usage data
privacy analysis
privacy detection model
privacy inference mining
privacy mining
private usage patterns
data privacy
security of data
data analysis
Data mining
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
learning (artificial intelligence)
privacy
Object recognition
mobile computing
smart phones
Metrics
Compositionality
password
biblio
Evaluating Side Channel Resilience in iPhone 5c Unlock Scenarios
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
iPhone 5c unlock scenarios
EM fault-injection
EM-based iOS studies
Fault injection
intrusion scenarios
iOS Security
iPhone
iPhone 5c model
iPhone 5c processor
electromagnetic fault-injection
locked iOS devices
locked iPhone 5c
malicious insiders
secure operating systems
side channel resilience
side channel vulnerabilities
side channel-based approach
Cryptography
application deployment
law enforcement
operating systems
operating systems (computers)
Compositionality
Metrics
Fingerprint recognition
smart phones
Hardware
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
encryption
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »