Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Humanoid robots
biblio
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
leaked information
US
transport protocols
taint analysis
suspicious URL
static taint analysis
smart phones
SG
Servers
security of data
pubcrawl
Metrics
malware
malicious applications leak multiple types
malicious Android applications
Android (operating system)
IP networks
invasive software
information exfiltration
identity-related sensitive information
hypermedia
Humanoid robots
HTTP-based information exfiltration
HTTP Based
Global Positioning System
composability
CN
clouds
Androids
Android applications
biblio
A Dynamic Taint Analysis Tool for Android App Forensics
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
Humanoid robots
tools
taint analysis
real-world apps
real-world Android apps
pubcrawl
online app stores
Mobile handsets
mobile forensic toolkits
mobile device
mobile computing
Metrics
Manuals
law enforcement investigators
android
Forensics
forensic evidentiary data
dynamic Taint analysis tool
Digital Forensics
digital forensic practitioners
digital forensic
Databases
composability
benchmark apps
automated mobile app analysis tool
app-generated evidence
Androids
Android app forensics
biblio
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
instant messaging applications
user chat message details
Smartphones
smart phones
Scalability
Resiliency
resilience
pubcrawl
mobile users
mobile networks
mobile forensic investigations
mobile devices
mobile computing
Metrics
local artifacts
instant messaging chat modes
android
instant messaging application
Instant messaging
Humanoid robots
Human Factors
Human behavior
electronic messaging
Digital Forensics
digital forensic analysis
digital forensic
Databases
Androids
Android smartphones
Android operating systems
android encryption
Android (operating system)
biblio
Hybrid Encryption for Securing SharedPreferences of Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
internal memory
XML
source code (software)
source code
smart phones
SharedPreferences
Shared Preference interface
Scalability
Resiliency
resilience
pubcrawl
password
Mobile Applications
Metrics
Keystore
android
hybrid encryption approach
Humanoid robots
Human Factors
Human behavior
encryption algorithm
encryption
Cryptography
confidential information
Androids
Android operating system
Android Keystore system
android encryption
Android applications
Android (operating system)
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
Crucial Answers About Humanoid Capital
Submitted by grigby1 on Mon, 12/10/2018 - 11:40am
capital
explainable artificial intelligence
Humanoid robots
pubcrawl
resilience
Resiliency
Scalability
xai
biblio
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
malicious apps
user devices
Training data
Training
Support vector machines
statistical analysis
smart phones
regression analysis
Random Forest
nonlinear classifiers
neural network
neural nets
malware
adversarial evasion attacks
machine learning
logistic regression
linear classifiers
learning (artificial intelligence)
invasive software
Humanoid robots
feature extraction
Androids
Android-based devices
Android Malware Detection
android malware classifiers
Extraction
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
invasive software
static analysis approach
sensitive API call graph
Resiliency
resilience
pubcrawl
privacy
Mobile communication
Metrics
malware instances
Malware Analysis
malware
Libraries
Algorithm design and analysis
Humanoid robots
Human behavior
Heuristic algorithms
graph theory
graph similarity metric
call graph structures
application program interfaces
Androids
Android Malware family characteristic analysis
Android (operating system)
android
biblio
SysPal: System-Guided Pattern Locks for Android
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
pattern locks
usability
system-guided pattern locks
SysPal policies
smart phones
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Android pattern lock
Password selection policy
password
mobile computing
Meters
Markov processes
Humanoid robots
Human behavior
Androids
Android screen lock patterns security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »