Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
The Cost of Path Information: Routing in Anonymous Communication
Submitted by grigby1 on Tue, 12/21/2021 - 10:18am
anonymous messaging
encryption
Information filters
Internet of Things
maximum likelihood estimation
Memory management
Mobile communication
pubcrawl
resilience
Resiliency
Routing
Scalability
biblio
Trusted Virtual Network Function Based on vTPM
Submitted by grigby1 on Mon, 11/08/2021 - 1:45pm
NFV
vTPM
Virtual machining
trusted platform modules
Trusted Platform Module
Trusted Computing
Resiliency
resilience
operating systems
pubcrawl
network function virtualization
Mobile communication
integrity measurement
information science
Hardware
cyber physical systems
cyber physical security
composability
biblio
Mobile security labware with smart devices for cybersecurity education
Submitted by grigby1 on Tue, 05/25/2021 - 2:35pm
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
Educational institutions
labware
Mobile communication
Mobile Security
privacy
pubcrawl
smart mobile device
smart phones
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
biblio
A Stackelberg-Based Optimal Profit Split Scheme in Information-Centric Wireless Networks
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
in-network caching
policy governance
clean slate
Stackelberg-based optimal profit split scheme
Stackelberg-based optimal network profit
mobile wireless networks
mobile traffic
ISP-CP cooperative schemes
information-centric wireless networks
information-centric networking architectures
telecommunication traffic
content providers
Mobile communication
Internet service providers
cooperative communication
internet
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 10:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »