Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission
Submitted by aekwall on Mon, 11/25/2019 - 2:01pm
hormonal cycle
smart phones
safekeeping echelon
pubcrawl
numerous hormones
mobile computing
male hormones
Human Factors
Human behavior
Hormone
hormonal system
Analogies and Transference
Follicle Stimulating Hormone
female hormones
entwined contemporary subsistence
Cryptography
cryptographic modus operandi
cosseted transmission
biological principle
android application development
Android application
biblio
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement
Submitted by aekwall on Mon, 11/11/2019 - 11:48am
IoT privacy policy agreement
test equipment
test bed
smart phones
smart phone
security of data
security
Scalability
pubcrawl
privacy policy agreement
Privacy Policies
privacy
policy test bed
mobile computing
Cloud Computing
IoT privacy policy
IoT policy
IoT manufacturers
IoT devices
Internet of Things devices
Internet of Things
Informatics
Human behavior
GDPR
data privacy
computer science
Compliance
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by aekwall on Mon, 06/10/2019 - 10:17am
Resiliency
wireless sensor networks
user security
traffic morphing
traffic analysis attack mitigation
telecommunication traffic
telecommunication security
telecommunication network routing
splitting traffic
Smartphones
smartphone sales
smartphone apps
smart phones
security
Routing
Ad hoc networks
Relays
pubcrawl
probability
privacy
multipath routing scheme
mobile computing
mobile ad hoc networks
Metrics
MANET Attack Mitigation
identifying apps
flow routing optimization problem
edge network assistance
data privacy
composability
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Data mining
bluetooth security
Frontline BPA Low Energy Analyzer
Bluetooth special interest group
Bluetooth Smart
bluetooth low energy
Bluetooth LE security
Bluetooth LE devices
Bluetooth LE connection
Bluetooth devices
Bluetooth
computer network security
smart phones
composability
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
Protocols
encryption
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
smart phones
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
potentially sensitive data
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
Google
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
actionable trustworthiness assessment
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
biblio
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers
Submitted by aekwall on Mon, 02/25/2019 - 11:42am
Filtering
text messages
stylistic features
spam SMS detection
Spam SMS
smart phones
short message service
phones
machine learning classifiers
information filtering
filtering spam emails
detection
deep learning methods
content-based machine learning techniques
content based advertisement
CAP curve
Scalability
machine learning
spam messages
electronic messaging
Unsolicited electronic mail
spam detection
unsolicited e-mail
pattern classification
Neural networks
Metrics
pubcrawl
Human behavior
learning (artificial intelligence)
Classification algorithms
Bayes methods
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »