Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
An Android Application Vulnerability Mining Method Based On Static and Dynamic Analysis
Submitted by aekwall on Fri, 08/12/2022 - 3:08pm
security
tools
feature extraction
Resiliency
Human behavior
Data mining
static analysis
pubcrawl
dynamic analysis
Android app
Androids
Humanoid robots
vulnerability mining
composabiity
biblio
PRIPRO:Solution for user profile control and management based on data privacy
Submitted by grigby1 on Thu, 07/08/2021 - 1:36pm
pubcrawl
user privacy in the cloud
user privacy
Ubiquitous Systems
taxonomy
smart phones
Scalability
Resiliency
resilience
Androids
Privacy Profile
privacy
Metrics
internet
Information systems
Humanoid robots
Hardware
cloud
biblio
Analysing Android App Privacy Using Classification Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
privateer
delicate individual information
gadget
Google Play necessities
helpful data
interesting authorization
material security
pertinent segments
pertinent sentences
Play Store
Cellular phones
protection arrangement
security ramifications
security-related dangers
sensitive information territory
shrewd authorizations
subjective utility
unsafe applications
unwavering quality
classification algorithm
authorization
data privacy
malware
mobile computing
Resiliency
pubcrawl
smart phones
software engineering
security of data
expandability
Android (operating system)
Compositionality
Android application
Androids
Humanoid robots
analysing android app privacy
authorizations posting
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 12:32pm
Humanoid robots
Web technologies
voting process
smart phones
smart phone
Servers
Scalability
Resiliency
resilience
pubcrawl
polling booth
OTP
mobile computing
Mobile Application
Metrics
internet
android encryption
Human behavior
government data processing
fraud voters
fraud
encryption
electronic voting
e-voting system
Cryptography
computer science
casted vote count
biometric
Androids
Android platform
AES256 algorithm
Aes256
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
Submitted by grigby1 on Thu, 12/17/2020 - 1:02pm
mobile
static analysis
Software
security
robot operating systems
Resiliency
resilience
pubcrawl
policy-based governance
patch
Androids
machine learning
Libraries
IoT
Humanoid robots
Human Factors
Human behavior
Firmware Vulnerabilities
dynamic analysis
deep learning
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
MVP mode
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
remote monitoring
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
computerised monitoring
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
security
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Androids
Operating systems security
system call analysis
malware game system calls
malicious gaming applications
malicious games
detection system
cloning applications
benign game system calls
Android operating systems
Android gaming malware detection system
Android Gaming Malware
computer games
Android (operating system)
Humanoid robots
Monitoring
resilience
Games
dynamic analysis
program diagnostics
invasive software
malware
Cloning
smart phones
mobile computing
composability
Resiliency
Metrics
pubcrawl
1
2
3
4
5
6
7
next ›
last »