Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
An Intelligent Behavior-Based Ransomware Detection System For Android Platform
Submitted by aekwall on Mon, 03/23/2020 - 12:26pm
android encryption
Scalability
Resiliency
Human behavior
Metrics
Android ransomware
Androids
APIs
composability
encryption
feature extraction
Humanoid robots
permissions
pubcrawl
Ransomware
biblio
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Submitted by aekwall on Mon, 11/11/2019 - 10:48am
Android mobile platform
User input
user data collection
private information
privacy-relevant app categories
privacy policy claims
privacy policy alignment
privacy leaks detection
Mobile privacy policy
Humanoid robots
graphical user interfaces
app producers
app code
Androids
Scalability
Android ecosystem
Android apps
Android applications
Android application
privacy protection
Privacy Policies
Layout
privacy
pubcrawl
Human behavior
mobile computing
Ontologies
data privacy
biblio
SCPN-Based Game Model for Security Situational Awareness in the Intenet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
security situational awareness
typical attack scenarios
stochastic colored Petri net
Smart homes
smart home environment
security situational awareness model
SCPN-based game model
SCPN
potential attack paths
IoT-based smart environment
IoT-based SCPN
heterogeneous devices
GT
complex smart environment
situational awareness
IoT
Petri nets
computer network security
Androids
game theory
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
Games
security
Internet of Things
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 11:17am
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 11:16am
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
Submitted by grigby1 on Mon, 12/10/2018 - 10:34am
iobt
Scalability
Robustness
Resiliency
resilience
pubcrawl
malware detection
malware
machine learning
Androids
Internet of Things Malware
Internet of battlefield things
internet
Human Factors
feature extraction
deep learning
Deep Eigenspace Learning
computer security
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 12:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »