Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
invasive software
static analysis approach
sensitive API call graph
Resiliency
resilience
pubcrawl
privacy
Mobile communication
Metrics
malware instances
Malware Analysis
malware
Libraries
Algorithm design and analysis
Humanoid robots
Human behavior
Heuristic algorithms
graph theory
graph similarity metric
call graph structures
application program interfaces
Androids
Android Malware family characteristic analysis
Android (operating system)
android
biblio
SysPal: System-Guided Pattern Locks for Android
Submitted by grigby1 on Thu, 06/07/2018 - 1:58pm
pattern locks
usability
system-guided pattern locks
SysPal policies
smart phones
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Android pattern lock
Password selection policy
password
mobile computing
Meters
Markov processes
Humanoid robots
Human behavior
Androids
Android screen lock patterns security
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 12:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone
Submitted by grigby1 on Tue, 02/27/2018 - 1:38pm
Metrics
Trusted Computing
third-party IME
smart phones
sensitive keystrokes
security
Runtime
pubcrawl
prefix-substitution attack
pre-IME guard
potentially harmful apps
PHA
mobile computing
Android (operating system)
keystroke analysis
Keyboards
input method editor
innovative TrustZone-based framework
IM-visor
Humanoid robots
Human Factors
Human behavior
colluding attacks
Androids
Android users
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »