Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Humanoid robots
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
A New Mobile Botnet Classification Based on Permission and API Calls
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
pubcrawl
malware
mobile botnet attacks
mobile botnet classification
mobile botnet detection
Mobile communication
mobile computing
pattern classification
program diagnostics
malicious mobile applications
random forest algorithm
random processes
resilience
Resiliency
smart phones
smartphone
static analysis
Android (operating system)
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Humanoid robots
Feature Selection
feature extraction
Drebin dataset
Compositionality
application programming interface
application program interfaces
APIs
API calls
Androids
Android botnet
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
Metrics
Trusted Computing
third-party IME
smart phones
sensitive keystrokes
security
Runtime
pubcrawl
prefix-substitution attack
pre-IME guard
potentially harmful apps
PHA
mobile computing
Android (operating system)
keystroke analysis
Keyboards
input method editor
innovative TrustZone-based framework
IM-visor
Humanoid robots
Human Factors
Human behavior
colluding attacks
Androids
Android users
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
biblio
CrackDex: Universal and automatic DEX extraction method
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
invasive software
virtual machines
universal unpacking system
universal DEX extraction
smart phones
simulation execution
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile computing
Metrics
Manuals
Libraries
Android (operating system)
Humanoid robots
Human Factors
Human behavior
encryption
DEX restoration
DEX reassembling
DEX packing
CrackDex
automatic DEX extraction
app
antivirus software
Androids
android encryption
Android application packing
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
SecTrans: Enhacing user privacy on Android Platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
Metrics
MIT
mobile computing
mobile phone
PDA
personal digital assistant
privacy
pubcrawl
Humanoid robots
Resiliency
RSA
Scalability
SecTrans
smart phones
textual data transmission
Triple DES
user data privacy
cellular radio
android
Android (operating system)
android encryption
Android mobile application
Android operating system
Androids
Blowfish
cell phone
AES
Cryptography
data privacy
decryption
encrypted format
encryption
Google
Human behavior
Human Factors
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »