Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
Evaluating Features and Effectiveness of Secure QR Code Scanners
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Browsers
Cryptography
cyber physical systems
Google
malware
Mobile communication
Phishing
pubcrawl
QR code scanner
QR codes
Resiliency
security
smartphone
Uniform resource locators
biblio
Anti-theft mobile phone security system with the help of BIOS
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
batteries
BIOS Security
Human Factors
Metrics
Mobile communication
Mobile phone tracking
mobile theft
pubcrawl
Resiliency
Scalability
security
security of mobile device
smart phones
Software
biblio
Mobile biometrics: Towards a comprehensive evaluation methodology
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Mobile communication
Training
testing
Smartphone Authentication
smart phones
Scalability
Resiliency
pubcrawl
Pervasive Computing Security
authentication
Mobile Biometrics
Metrics
Human-computer interaction
Human Factors
Guidelines
biometrics (access control)
biometrics
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
TextDroid: Semantics-based detection of mobile malware using network flows
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
Conferences
feature extraction
Human behavior
malware
Mobile communication
mobile computing
natural language processing
pubcrawl
Resiliency
Scalability
security
Support vector machines
biblio
Detecting mobile botnets through machine learning and system calls analysis
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
malware
threat minimization
system call analysis
statistical feature extraction
statistical analysis
self-generated dataset
Resiliency
pubcrawl
pattern detection
Monitoring
Mobile handsets
mobile environment
mobile computing
Mobile communication
mobile botnet detection
Metrics
anomalous behavior identification
machine learning algorithms
machine learning
legitimate application
learning (artificial intelligence)
invasive software
Internet security
internet
host-based approach
feature extraction
desktop domain
computer network security
Compositionality
close-to-reality scenario
botnets
anomaly-based approach
biblio
A Temporal Blockchain: A Formal Analysis
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
Peer-To-Peer
temporal rolling blockchain
system monitoring
security of data
security
Scalability
Resiliency
pubcrawl
Protocols
peer-to-peer method
Peer-to-peer computing
blockchain
Online banking
Mobile communication
formal analysis
fixed-size blockchain
distributed systems
distributed storage
Cryptography
cryptocurrencies
blockchain-based systems
blockchain security
biblio
Ransomware Inside Out
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Metrics
smart phones
security
Resiliency
ransomware functionality
Ransomware
pubcrawl
model checking
mobile environment
mobile computing
Mobile communication
android
malware
Java
invasive software
Humanoid robots
Human behavior
formal verification
formal methods
formal method
composability
Androids
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »