Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
smartphone
NFC- enabled smartphones
personally owned devices
pubcrawl
resilience
Resiliency
resources access
Servers
smart phones
network security
user authentication
Wi-Fi network
Wireless fidelity
wireless LAN
wireless local area network
WPA2 Enterprise
WPA2-802.1X model
authentication
Near Field Communication
multifactor authentication
Multi-factor authentication
Metrics
hybrid encryption
hybrid cryptosystem
Human Factors
Human behavior
Enterprise WiFi hotspot authentication
enterprise Wi-Fi hotspot authentication
encryption
Cryptography
connectivity
company information
business data transmission
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 11:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps
Submitted by aekwall on Mon, 04/13/2020 - 10:05am
Security by Default
User Ratings
trust
subjective logic
static taint analysis
smart phones
smart mobile devices
SERS
sentiment analysis
security-related internal aspect
security-related comments
security-related and evidence-based ranking scheme
security of data
app distribution platforms
security
Scalability
Resiliency
ranking
pubcrawl
mobile computing
Mobile Apps
Measurement
Google PlayStore
Google
Databases
Data mining
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
—Multiple Cluster-Android lock Patterns (MALPs) for Smart Phone Authentication‖
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
cluster based progressive smart lock
pattern locks
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
progressive authentication service
Pattern
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
dependent combination
Scalability
cluster
ALP
Android (operating system)
authentication
pattern matching
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »