Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
Efficient Software Implementation of ZUC Stream Cipher
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
Resiliency
pubcrawl
composability
Metrics
optimization
information security
Mobile communication
software implementation
ZUC stream cipher
signal processing security
biblio
An augmented cubature Kalman filter for nonlinear dynamical systems with random parameters
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
Mobile communication
time-of-arrival estimation
time difference of arrival
TDOA measurements
state vector
Resiliency
resilience
random sensor positions
random parameters
pubcrawl
Probability density function
Nonlinear dynamical systems
nominal values
Noise measurement
mobile source localization
augmented cubature Kalman filter
Metrics
Kalman filters
estimation accuracy
estimation
Dynamical Systems
discrete nonlinear dynamical systems
cubature point
Cubature Kalman filter
computational complexity
composability
CKF
Bayesian filtering problem
Bayes methods
augmented system
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
resilience
mobile computing
mobile positioning devices
points-of-interest recommendation
privacy
privacy-preserving trajectory mining
pubcrawl
recommendation
recommender systems
Mobile communication
Resiliency
road networks
Scalability
sensitive location information exposure
traffic engineering computing
Trajectory
trajectory data mining
trajectory dataset
Electronic mail
association matrix extraction
Bipartite graph
Computing Theory
Data mining
data privacy
differential privacy
differential privacy guarantees
differentially private trajectory analysis
Algorithm design and analysis
graph theory
high-speed wireless networks
HITS
Human behavior
human factor
hyperlink-induced topic search
large-scale trajectory data
location privacy
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
invasive software
static analysis approach
sensitive API call graph
Resiliency
resilience
pubcrawl
privacy
Mobile communication
Metrics
malware instances
Malware Analysis
malware
Libraries
Algorithm design and analysis
Humanoid robots
Human behavior
Heuristic algorithms
graph theory
graph similarity metric
call graph structures
application program interfaces
Androids
Android Malware family characteristic analysis
Android (operating system)
android
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
pubcrawl
wikipedia discussions
unsupervised approach
Taste-based Similarity MANET
taste-based group
taste-based collaborative filtering technique
sub-group detection performance
Social networking sites
social networking (online)
Social network services
Social Mediadata
social media discussion data
sensors
Resiliency
resilience
Collabarative Filtering
privacy
p2p
Mobile powered sub-group detection/formation
mobile computing
Mobile communication
Metrics
MANET
implicit attitude
Global Positioning System
explicit attitude
debate discussion forum
computer science
Compositionality
collaborative filtering
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »