Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
Android #x0022;Health-Dr. #x0022; Application for Synchronous Information Sharing
Submitted by BrandonB on Wed, 05/06/2015 - 2:16pm
middleware
Health-DR. Engineering
healthy environment
Insurance
Insurance acumen or actuary
insurance agent
IT environment
medical annals
Medical services
electronic health records
Mobile communication
mobile computing
patient affability
Patient flexibility
physician
professional authentications
synchronous information sharing
user authentication
bibliography
Alert mechanism
ambulatory appliances
Android (operating system)
Android Health-Dr
Androids
annals management
Annotations of records
authentication
affability management
client discovery
database transit
Databases
dispensary
doctor affability
Doctor Flexibility
e-health application
Educational institutions
biblio
Design method for developing a Mobile Engineering-Application Middleware (MEAM)
Submitted by BrandonB on Wed, 05/06/2015 - 2:12pm
Business
Design Method
Design methodology
IT environment
MEAM
Measurement
middleware
Mobile Application
Mobile communication
mobile computing
Mobile Engineering Application Middleware
mobile engineering-application middleware
security
Systematics
touchscreen-based handling
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Personalized authentication procedure for restricted web service access in mobile phones
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
mobile computing
web services
smart phones
Servers
security
restricted Web service access
personalized authentication procedure
performance evaluation
multilevel authentication procedure
Multi-Level Authenticatio
mobile phones
Mobile handsets
authentication
Mobile communication
malware intrusions
internet
face recognition
biometrics (access control)
biometric signature acquisition device
Biometric Recognition
biometric face recognition
biometric capture device
authorisation
biblio
A survey of Black hole attack detection in Manet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Mobile communication
telecommunication security
server
security
RREQ
RREP
Routing protocols
route discovery
received RREQ
radiowave propagation
peer-to-peer network
Peer-to-peer computing
network servers
mobile conferencing
academic purpose
mobile ad-hoc network
mobile ad hoc networks
military communication
MANET
Europe
emergency communication
decentralised network
client-server systems
client
black hole attack detection
Black hole attack
AODV protocol
Ad-HOC
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
biblio
Defense on the Move: Ant-Based Cyber Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Mobile communication
target tracking
Swarm Intelligence
Statistics
security of data
protected infrastructure
Particle swarm intelligence
optimisation
MTD
moving-target defense
mobile resilient defense
ant-based cyber defense
malware
digital ants
Detectors
defended systems
Database systems
Cyberspace
Cybersecurity
computer security
Computer crime
biblio
App vetting systems: Issues and challenges
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
computer security
information technology
Laboratories
Mobile communication
Mobile handsets
NIST
biblio
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
security
XSS vector testing
XSS
Web browser attack surface
web applications
Web
Vectors
testing
systematic security regression testing
security of data
browser
regression analysis
Regression
Payloads
online front-ends
Mobile communication
HTML
cross-site scripting
Browsers
biblio
VirtueMAN: A software-defined network architecture for WiFi-based metropolitan applications
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
QoS
wireless LAN
wireless access point
WiFi-based metropolitan application
VirtueMAN
telecommunication traffic
software-defined network architecture
software defined networking
security
SDN-based network architecture
quality of service
authentication
Protocols
Mobile communication
IP-independent forwarding scheme
intranetwork distributed cross-layer traffic control protocol
internet
IEEE 802.11 Standards
Heart beat
distributed network-wide controller
configurable user access control
authorisation
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »