Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
CrackDex: Universal and automatic DEX extraction method
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
invasive software
virtual machines
universal unpacking system
universal DEX extraction
smart phones
simulation execution
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile computing
Metrics
Manuals
Libraries
Android (operating system)
Humanoid robots
Human Factors
Human behavior
encryption
DEX restoration
DEX reassembling
DEX packing
CrackDex
automatic DEX extraction
app
antivirus software
Androids
android encryption
Android application packing
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
SecTrans: Enhacing user privacy on Android Platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
Metrics
MIT
mobile computing
mobile phone
PDA
personal digital assistant
privacy
pubcrawl
Humanoid robots
Resiliency
RSA
Scalability
SecTrans
smart phones
textual data transmission
Triple DES
user data privacy
cellular radio
android
Android (operating system)
android encryption
Android mobile application
Android operating system
Androids
Blowfish
cell phone
AES
Cryptography
data privacy
decryption
encrypted format
encryption
Google
Human behavior
Human Factors
biblio
Malware Collection and Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
malware
University of Arizona
security
Resiliency
pubcrawl
National Science Foundation funded project
malware datasets
Malware Collection
Malware Analysis
Androids
invasive software
Information Reuse
Humanoid robots
feature extraction
Data mining
computer security
Big Data
biblio
Ransomware Inside Out
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Metrics
smart phones
security
Resiliency
ransomware functionality
Ransomware
pubcrawl
model checking
mobile environment
mobile computing
Mobile communication
android
malware
Java
invasive software
Humanoid robots
Human behavior
formal verification
formal methods
formal method
composability
Androids
biblio
Smartphone: The key to your connected smart home
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial authentication
user control point
User Centric Automation
Training
smart phones
secret pin based authentication
pubcrawl170113
Internet-of-Things
Humanoid robots
home security
home based automation systems
home automation
facial recognition
Accuracy
face recognition
eigenfaces algorithm
dual factor based authentication
connected smart home
building management systems
biometrics
authentication
Androids
Android based smartphone
Android application
Android (operating system)
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
Cloud-based Android botnet malware detection system
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
feature extraction
Vyatta
smart phones
Servers
runtime Android malware analysis
pubcrawl170109
open source development framework
multilayered algorithm
malware
Java
invasive software
Humanoid robots
Android (operating system)
digital crime groups
Cloud-based malware detection
cloud-based Android botnet malware detection system
Cloud Computing
Classification algorithms
botnet detection learning dataset
Androids
Android Sandbox
Android on VirtualBox
Android botnet family detection
Android botnet
biblio
"A Dynamic Supervisory Mechanism of Process Behaviors Based on Dalvik VM"
Submitted by grigby1 on Thu, 02/23/2017 - 12:34pm
malware
system security sensitive behavior
system resource monitoring
system resource auditing
supervisory proces
spy privacy
smartphone security threats
smart phones
security
pubcrawl170105
private information
mobile phones
android
malicious chargeback software
Java
Humanoid robots
framework
dynamic supervisory mechanism
data privacy
Dalvik VM
Cameras
Androids
Android operating system
Android (operating system)
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »