Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
Mobile Security
APP-related information
iMonitor
iOS (operating system)
iOS 9+
iOS devices
labeling system
Mobile app
mobile network
mobile network traffic
APP-level traffic monitoring
mobile traffic monitoring
network monitor
NetworkExtension framework
privacy leakage detection
traffic classification methods
traffic label
User profiling
user-related information
iOS Security
smart phones
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
mobile computing
Monitoring
sensors
Metrics
Virtual private networks
Compositionality
traffic engineering computing
ios
.pcap files
APP labels
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 12:21pm
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
Protective relaying
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
CIT algorithm
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
security of data
Abnormal data diagnose
open network environment
Integrated circuit modeling
Numerical models
sensors
power engineering computing
Substations
data analysis
smart phones
composability
pubcrawl
Resiliency
real-time systems
telecommunication security
Internet of Things
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
Enabling Secure Voice Input on Augmented Reality Headsets using Internal Body Voice
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
speech-based user interfaces
primary input method
privacy
pubcrawl
resilience
Resiliency
security of data
smart phones
Speech recognition
multi-agent systems
Stability analysis
Synchronization
voice spoofing attack
voice verification techniques
voice-based input
voice-spoofing attacks
voice-spoofing defense system
voice-spoofing defense systems
human voices
AR headsets
augmented reality
augmented reality headsets
composability
cyber physical systems
Eigenvalues and eigenfunctions
handy recorders
Human Factors
Aerospace electronics
immersive systems
inaudible voice commands
internal body propagation
internal body voice
Laplace equations
Linear systems
liveness detection
biblio
Hybrid Feature Extraction for Palmprint-Based User Authentication
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
Metrics
user identity verification
texture
Smartphones
smart phones
security
Resiliency
resilience
pubcrawl
palmprint-based user authentication
palmprint recognition
multifactor authentication
mobile verification scenarios
Mobile handsets
mobile computing
authentication
IT systems
image texture
image colour analysis
hybrid feature extraction
Human Factors
Human behavior
Histograms
feature extraction
Discrete Fourier transforms
Databases
color information
biometry
authorisation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »