Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Androids
biblio
The GAMBAS middleware and SDK for smart city applications
Submitted by BrandonB on Wed, 05/06/2015 - 2:19pm
Androids
Cities and towns
data acquisition
distraction-free support
GAMBAS middleware
Humanoid robots
Java
Java-based runtime system
middleware
Runtime
SDK
security
smart city applications
software development kit
software engineering
biblio
Android #x0022;Health-Dr. #x0022; Application for Synchronous Information Sharing
Submitted by BrandonB on Wed, 05/06/2015 - 2:16pm
middleware
Health-DR. Engineering
healthy environment
Insurance
Insurance acumen or actuary
insurance agent
IT environment
medical annals
Medical services
electronic health records
Mobile communication
mobile computing
patient affability
Patient flexibility
physician
professional authentications
synchronous information sharing
user authentication
bibliography
Alert mechanism
ambulatory appliances
Android (operating system)
Android Health-Dr
Androids
annals management
Annotations of records
authentication
affability management
client discovery
database transit
Databases
dispensary
doctor affability
Doctor Flexibility
e-health application
Educational institutions
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:30pm
cryptographic misuse vulnerability model
Vulnerability
static analysis
Runtime
prototype tool crypto misuse analyser
program diagnostics
Modelling Analysis
Humanoid robots
encryption
Cryptography
Analytical models
cryptographic misuse autodetection
Cryptographic Misuse
cryptographic API
CMA
application program interfaces
Androids
Android application
Android (operating system)
android
biblio
Comparative mobile platforms security solutions
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
mobile computing paradigm
Windows Phone
smart phones
smart phone
sensitive information
security of data
QNX
private information
mobile platform security solution
android
mobile computing
Mobile communication
Kernel
ios
encryption
comparative mobile platforms
BlackBerry
Androids
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 1:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
biblio
Do you think your passwords are secure?
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
encryption
usability
ubiquitous computing
ubiquitous access
security-critical application
password security
mobile device
message authentication
key derivation function
Humanoid robots
Android password-manager
direct decryption
Databases
Cryptography
cryptographic key
bruteforce attack
authorisation
authentication
Androids
biblio
Protecting and Identifiying Smartphone Apps Using Icmetrics
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
Humanoid robots
Web-server spoofing
software programs
Software
smartphone application protection
smartphone application identification
smart phones
security
Mobile Security
identifier generation
ICmetrics
Android apps
hardware programs
Hardware
fraud identification
feature extraction
encryption key generation
encryption
Cryptography
biometrics
Androids
Android security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »