Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
A Hybrid Encryption Technique based on DNA Cryptography and Steganography
Submitted by grigby1 on Wed, 07/12/2023 - 1:35pm
encryption
pubcrawl
Human behavior
Metrics
resilience
privacy
encoding
Mobile communication
DNA
Steganography
Huffman coding
Resiliency
codes
DNA cryptography
DNA Steganography
hybrid encryption
biblio
A Survey on Mobile Malware Detection Methods using Machine Learning
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
malware
mobile malware
dynamic malware detection
iOS Security
Traffic detection
Mobile communication
Mobile Security
operating systems
Compositionality
machine learning
Runtime
telecommunication traffic
Conferences
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
A Secure Smart Meter Application Framework
Submitted by grigby1 on Fri, 03/03/2023 - 12:15pm
Registers
billing
flexibility
iOS Security
smart meter
Mobile communication
trustworthiness
operating systems
Compositionality
security
smart phones
smart meters
electricity
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
A Review of Android and iOS Operating System Security
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
ios
privacy threat
mobile device security
memory randomization
isolation
application sandboxing
policy governance
sandboxing
Memory
Mobile communication
encryption
android
operating systems
Mobile Applications
composability
pubcrawl
security
Organizations
collaboration
biblio
Privacy-Preserving Proximity Detection Framework for Location-Based Services
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
sensors
private proximity detecting
location based services(LBSs)
Location Privacy in Wireless Networks
location privacy
privacy preserving
Homomorphic encryption
Mobile communication
Performance analysis
wireless networks
Compositionality
Servers
composability
Wireless communication
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Development of a Set of Procedures for Providing Remote Access to a Corporate Computer Network by means of the SSH Protocol (Using the Example of the CISCO IOS Operating System)
Submitted by grigby1 on Fri, 09/30/2022 - 3:55pm
operating systems
corporate computer network remote control
Cisco
ios
iOS Security
Resiliency
SSH
emulation
Mobile communication
computer networks
security
Resistance
Compositionality
Protocols
Software
resilience
Metrics
Human Factors
pubcrawl
biblio
Smart Blockchain-based Control-data Protection Framework for Trustworthy Smart Grid Operations
Submitted by grigby1 on Tue, 09/20/2022 - 2:14pm
machine learning
pubcrawl
policy-based governance
resilience
Scalability
Protocols
Smart Grid
Smart Grids
blockchain
Meters
Mobile communication
False Data Injection
Memory
Resiliency
blockchains
false trust
biblio
Virtualization in Mobile Cloud Computing for Augmented Reality Challenges
Submitted by grigby1 on Fri, 09/09/2022 - 2:53pm
Cloud Computing
security
pubcrawl
Human behavior
Metrics
resilience
privacy
composability
Virtualization
taxonomy
virtualization privacy
Mobile communication
Systems architecture
Resiliency
mobile cloud computing
biblio
Information Security Assessment On Court Tracking Information System: A Case Study from Mataram District Court
Submitted by aekwall on Wed, 04/13/2022 - 10:14am
security management
information security
pubcrawl
Resiliency
Government
ISO standards
Regulation
passwords
Assessment
CMMI
ISO/IEC 27001:2013
Mobile communication
SIPP
Damage Assessment
biblio
Lightweight Proactive Moving-target Defense for Secure Data Exchange in IoT Networks
Submitted by grigby1 on Tue, 02/22/2022 - 5:46pm
Metrics
pubcrawl
security
Internet of Things
Steganography
Mobile communication
simulation
moving target defense
uncertainty
sensors
Cybersecurity
Scalability
Resiliency
resilience
1
2
3
4
5
6
7
8
9
…
next ›
last »