Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
An Effective Android Ransomware Detection Through Multi-Factor Feature Filtration and Recurrent Neural Network
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
smart phones
multifactor feature filtration
majority voting process
Long short-term memory
filtration
feature selection algorithms
feature filtration techniques
deep learning-based malware detection model
Android ransomware detection
Android malware dataset
Android malware
Android environment
recurrent neural network
defense mechanisms
recurrent neural nets
forensic analysis
security
Malware Analysis
Digital Forensics
Metrics
deep learning
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Feature Selection
feature extraction
mobile computing
invasive software
smart devices
biblio
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
multisensor fusion
zero-effort multifactor authentication system
zero-effort authentication
ZEMFA
wearables
Walking-pattern
two factor authentication
smart phones
single authentication factor
sensors
pubcrawl
Phone
authentication
multimodal gait biometrics
multidevice fusion
mobile computing
Human Factors
gait analysis
Context
biometrics (access control)
biometrics
authorisation
authentication token
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
data comparison analysis
wearables security
wearable technology
Manuals
low-cost HETP fitness tracker
location data
HETP watches
Garmin Forerunner 110
garmin
fitness bands
Fitbit Charge HR
fitbit
digital forensic practitioners
Scalability
wearable computers
Wearable devices
Biomedical monitoring
forensic analysis
smart phones
Digital Forensics
Data mining
privacy
pubcrawl
Human behavior
Resiliency
Internet of Things
biblio
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
random number
wearables security
WristUnlock
WristRaise mode
wrist wearable
wearable computers
usable smartphone
usability features
touch-based physical channel
touch sensitive screens
Smartphone Authentication
secure smartphone
security
Bluetooth connection
Bluetooth
usability
smart phones
privacy
pubcrawl
Human behavior
Resiliency
Scalability
security of data
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
Secure Smart Card Signing with Time-based Digital Signature
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
DER Decoder
trusted digital signing process
trusted digital signature
time-based digital signature
time stamping protocol packet
Terminal Attack
smart card terminal
sign documents
Secure Time Stamp
secure smart card signing
Pins
PIN sniffing
message alteration attack
Java Card
electronic signature
security of data
cybersecurity challenges
current smart card digital signature
smart cards
microsoft windows
digital signatures
message authentication
smart phones
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Conferences
Scalability
biblio
Integration of CPU and GPU to Accelerate RSA Modular Exponentiation Operation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
Mode power operation
tools
stored information
smart phones
security of data
Scalability
RSA modular exponentiation operation
RSA encryption algorithm
RSA
Resiliency
public key cryptography
pubcrawl
personal information
parallel programming
parallel computing
parallel architectures
accelerating RSA algorithm
graphics processing units
graphics process unit
GPU parallel programming
gpu
exponentiation
encryption efficiency
encryption
Data Security
CUDA
CPU
compute unified device architecture
Complexity theory
central process unit
Acceleration
biblio
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
Pattern
smart phones
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
Scalability
Resiliency
resilience
pubcrawl
progressive authentication service
pattern matching
pattern locks
ALP
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
mobile computing
Human Factors
human factor
Human behavior
dependent combination
cluster based progressive smart lock
cluster
authorisation
authentication
Android (operating system)
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »