Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile phones
biblio
Secure Wireless Sensor Network Design Using a New Method of High-Speed Lightweight Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 11:47am
wireless networks
WSN: Wireless Sensor Network
PSNR: Peak Signal to Noise Ratio
MSE: Mean Square Error
mobile phones
HSLE
High-Speed Lightweight Encryption
Encoding Time
efficient encryption
Delay effects
encryption
Probabilistic logic
composability
wireless sensor networks
Throughput
Resiliency
resilience
pubcrawl
IoT
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
Design of a Smart Home System Using Bluetooth Protocol
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security systems
unit system
Sensor
printed circuit layout
peripheral interfaces
Peripheral interface controller microcontroller
PCB layout design
Micro-controller
main processer
home processes
fully functional smart home prototype
Diptrace software
centralized control unit
Bluetooth protocol
Bluetooth based smart home automation system
bluetooth security
Bluetooth
Home appliances
Bars
relay
mobile phones
Smart homes
microcontrollers
Switches
home automation
composability
Protocols
Resiliency
resilience
Human behavior
pubcrawl
biblio
Interference of Cyber Endanger using Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
on-line exchanges
Web structure associations
Web record remark
Support vector machines
Support Vector Machine(SVM)
support vector machine
sort machine
security of data
SDA
robotized revelation
Resiliency
pubcrawl
Predictive Metrics
persistent repeated mischief
PC systems
Patching
advanced badgering
monetary machine
mobile phones
line associations
less steeply-esteemed acknowledgment displays
internet
Interference
Hinduja
cyberbullying
cyber-tormenting cases
cyber endanger
cosmology
composability
burden their mates
basic ordinary language sections
assembling
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
ARMv8-A processor
application programming interface
tablets
suspected Flush+Reload
static code analysis schemes
secure collaborative API
obfuscation techniques
mobile phones
Flush+Reload attack
Flush+Flush cache attacks
Flush+Flush attack
flush operation API
Collabo rative API
security of data
ARMv8 A
Compositionality
application program interfaces
APIs
program diagnostics
performance evaluation
cache storage
mobile computing
microprocessor chips
Resiliency
resilience
pubcrawl
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 11:21am
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Machine Learning Security Allocation in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
pubcrawl
IoT situation
IoT-helped vitality obliged stages
learning (artificial intelligence)
light-weighted profound learning base framework
Metrics
mobile phones
nearby facial pictures dataset
numerous asset compelled gadgets mobile phones
ongoing facial picture recovery frameworks
picture utilizing Viola-Jones calculation
proficiency
IoT condition
question
Raspberry Pi
Resiliency
Scalability
security
security allocation
Shape
Support vector machines
utilizes convolutional framework layers
Viola-Jones calculation
vitality obliged gadgets
extra face classifier
cell phones
Cellular phones
characterized highlights
CNN
composability
computational abilities
computational intricacy
constant recovery
convolutional neural nets
crop face areas
edge detection
archive pictures
Face
face pictures
face recognition
feature extraction
financially savvy pre-prepared CNN
huge information vault
Image edge detection
Internet of Things
IoT
IoT applications
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
1
2
next ›
last »