Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
The rules of engagement for cyber-warfare and the Tallinn Manual: A case study
Submitted by BrandonB on Mon, 05/04/2015 - 1:40pm
Force
Tallinn Manual
standards
security of data
Protocols
Organizations
Manuals
Law
international law
Computer crime
cyber-warfare
Cyber-Terrorism
cyber-sabaotge
cyber-espionage
cyber-attacks
Cooperative Cyber Defence Centre of Excellence
Computers
biblio
A challenge of authorship identification for ten-thousand-scale microblog users
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
Internet security issues
Twitter
Training
ten-thousand-scale microblog users
social networking (online)
security of data
security
microblog texts
microblog
authorship attribution
internet
Distance measurement
Computers
Blogs
Big Data
authorship identification
authorship detection
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 12:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Development of a keyboardless social networking website for visually impaired: SocialWeb
Submitted by BrandonB on Mon, 05/04/2015 - 10:33am
message authentication
Web Speech API
visually impaired people
user friendliness
STT conversion
speech to text conversion technologies
Speech recognition
Speech
SocialWeb
social networking (online)
Social network services
screen readers
screen reader
Acoustic Fingerprinting
Media
malicious attackers
keyboardless social networking Website
human computer interaction
handicapped aids
Fingerprint recognition
Computers
computer proficiency
Communities
Audio fingerprinting
Assitive technologies
assistive technologies
biblio
Malicious code detection model based on behavior association
Submitted by BrandonB on Thu, 04/30/2015 - 1:28pm
automation
behavior association
behavior monitor
Computers
Grammar
malicious code
Monitoring
pushdown automation
Trojan horses
Virtual machining
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 12:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 12:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers
biblio
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Mobile Security
Web browser
survey
Smartphones
smart phones
security of data
security
operating systems
nuts
bolts
mobile network security
mobile devices
mobile computing
Mobile communication
Internet society
internet
Computers
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
« first
‹ previous
…
14
15
16
17
18
19
20
21
22