Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
android
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 11:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Internet of Things (IoT) Based Door Lock Security System
Submitted by aekwall on Fri, 04/01/2022 - 2:05pm
Predictive Metrics
Scientific Computing Security
security system
mobile
Internet of Things (IoT)
scientific computing
Arduino
information management
android
privacy
Mobile Applications
wireless networks
Prototypes
Compositionality
Resiliency
pubcrawl
Pins
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
biblio
Cloud based mobile application security enforcement using device attestation API
Submitted by aekwall on Tue, 01/25/2022 - 3:48pm
web services
STRID
SafetyNet
Mobile OS
mobile
Google Play Services
education
attestation
android
Mobile handsets
Computational modeling
Mobile Applications
composability
Human behavior
Resiliency
pubcrawl
rest
Analytical models
Cloud Computing
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
android
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
Analysis and Detection of Android Ransomware for Custom Encryption
Submitted by grigby1 on Mon, 01/10/2022 - 12:15pm
android
android encryption
API
Bait file
Conferences
custom encryption
encryption
Entropy
Human behavior
information entropy
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Scalability
biblio
CRYLOGGER: Detecting Crypto Misuses Dynamically
Submitted by grigby1 on Mon, 12/20/2021 - 11:29am
Hash functions
tools
security
Resiliency
resilience
pubcrawl
privacy
Misuses
internet
Heuristic algorithms
android
encryption
Cryptography
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API
biblio
Analyzing Cryptographic API Usages for Android Applications Using HMM and N-Gram
Submitted by aekwall on Mon, 11/29/2021 - 2:27pm
Cryptography
Markov processes
Libraries
tools
Analytical models
pubcrawl
composability
Probabilistic logic
Compositionality
Hidden Markov models
android
API analysis
cryptographic API
hidden Markov model
N-gram
theoretical cryptography
1
2
3
4
5
6
7
8
9
next ›
last »