Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
MAS: Mobile-Apps Assessment and Analysis System
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile Applications
Trusted Computing
Taiwan government
static analysis
Security Validation
security of data
Scalability
Resiliency
resilience
pubcrawl
program diagnostics
Mobile Security
mobile computing
Mobile communication
mobile apps assessment and analysis system
Android (operating system)
Metrics
MAS
Human Factors
Human behavior
Guidelines
Government
Google Play store
Google
encryption
dynamic analysis
automatic security validation system
android encryption
Android apps
Android app
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Mobile communication
Web servers
two-server
Resiliency
resilience
pubcrawl
privacy protection
multifactor authentication
multifactor
authentication
mobile cloud computing
Metrics
Human Factors
human factor
Human behavior
Fingerprint recognition
BAN
biblio
Chaotic Searchable Encryption for Mobile Cloud Storage
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
chaos
cloud
Cloud Computing
composability
encryption
Keyword search
locality sensitive hashing
Mobile communication
pubcrawl
Resiliency
searchable encryption
security
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
Kings Eye: Platform Independent Situational Awareness
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
operating system
user interfaces
Smart device
situational awareness
Servers
security
Resiliency
pubcrawl
Prototypes
platform independent situational awareness prototype
batteries
Mobile communication
military systems
military equipment
Metrics
kings eye
Databases
composability
BYOD
bring your own device
biblio
Secure Information Sharing among Autonomous Vehicles in NDN
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
named data networking
wireless environment
vehicular data authentication
vehicular ad hoc networks
vehicle tracking
vehicle names
telecommunication security
security
secure information sharing
secure data sharing
robust decisions
Resiliency
Raspberry Pi
pubcrawl
pseudonym scheme
NDN
Accidents
Mobile communication
mobile ad-hoc environment
Metrics
IP networks
Internet of Vehicles
Internet architecture
internet
Human Factors
Human behavior
Data Security
Data models
data delivery
cyber physical systems
autonomous vehicular network
autonomous vehicles
biblio
Secure and resilient scheme for data protection in unattended wireless sensor networks
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
wireless sensor networks
sensors
Security analysis
Resilient Security Architectures
Resiliency
pubcrawl
Mobile communication
Fragmentation
Data protection
Data dispersal
Cryptography
authentication
biblio
SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
composability
Engines
Metrics
Mobile communication
Mobile handsets
operating systems
Operating systems security
privacy
Privacy Policies
pubcrawl
Resiliency
security
Synchronization
Ubiquitous Computing Security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »