Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
A Mixed and Batching Authentication Protocol for Grouped Tags in Mobile RFID System
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
Mobile communication
Wireless communication
tracking attack
Servers
security and privacy
reply attack
radiofrequency identification
pubcrawl170112
Protocols
mutual authentication
mobile RFID system
Mobile RFID
mobile radio frequency identification
authentication
mixed authentication protocol
low cost tags
lightweight authentication
Lightweight
impersonation attack
hash based authentication
Grouping
grouped tags
Databases
Cryptographic Protocols
batching authentication protocol
biblio
A hopping sensor deployment scheme based on virtual forces
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
maximal coverage optimization problem
wireless sensor networks
Wireless Sensor Network
Voronoi neighbor sensor
virtual force algorithm enhancement
telecommunication power management
Robot sensing systems
pubcrawl170110
optimization
mobile sensor continuous dynamics
Mobile communication
dynamics
local Voronoi cell centroid
hopping sensor dynamics equation
hopping sensor discrete dynamics
hopping sensor deployment scheme
hopping sensor constraint dynamics
Heuristic algorithms
Force
energy efficient hopping sensor
energy conservation
biblio
Optimal Power Control and Rate Adaptation for Ultra-Reliable M2M Control Applications
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
telecommunication power management
rate adaptation problem
reliability requirements
Scheduling algorithms
sensor nodes
Shannon capacity formulation
signal-to-interference-plus-noise ratio
SINR
stringent timing
telecommunication control
pubcrawl170110
telecommunication scheduling
transmission delay
transmission power
transmission schedule
transmitting nodes
ultrareliable M2M control
ultrareliable machine-to-machine control
wireless channels
Wireless communication
limited battery resources
additive white Gaussian noise wireless channel
AWGN channels
AWGN wireless channel
continuous rate transmission
delay error
delays
discrete rate transmission
energy consumption
information theory
Adaptation models
Mobile communication
optimal control
optimal power control
optimization
packet error
polynomial time algorithm
power consumption
power control
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 12:12pm
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"Hiding User Privacy in Location Base Services through Mobile Collaboration"
Submitted by grigby1 on Thu, 02/23/2017 - 11:40am
mobile networks
Web surfing
web services
user privacy
telecommunication security
Smartphones
smart phones
Servers
pubcrawl170105
privacy
Peer-to-peer computing
mobility management (mobile radio)
collaboration
mobile crowd method
Mobile communication
mobile collaboration
location-based services
location privacy
location base services
location aware system
LBS server
GPS
Global Positioning System
biblio
"Real time secure end to end communication over GSM network"
Submitted by grigby1 on Tue, 02/14/2017 - 12:18pm
GSM speech channel
transcoding
speech trans-coding process
Speech
real time secure end to end communication
pubcrawl170102
Modem
mobile phones
Mobile handsets
Mobile communication
cellular radio
GSM network
GSM
encryption
digital techniques
decryption
decoding algorithm
Cryptography
Codecs
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »