Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
mobile devices
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
authorisation
security
Servers
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
data privacy
privacy
health care
composability
mobile computing
Computer crime
sensitive information
Security analysis
Data Security
security vulnerability
mobile devices
Privacy Risk
malicious attack
Biomedical monitoring
bluetooth security
Bluetooth networking
Bluetooth pairing process
dieting formula
eating constraint
fitbit
Google Glass
Hacker
health monitor system
health tracker devices
human health parameter monitoring
Jawbone
mobile health
mobile wearable health devices
privacy breach
privacy features
security risk
sensitive data information
user data security
user sleeping arrangements
Wearable devices
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
Cryptography
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Metrics
authentication
message authentication
Ad hoc networks
mobile radio
public key cryptography
Elliptic curve cryptography
Elliptic curves
MANET
mobile ad hoc networks
mobile computing
mobile ad hoc network
elliptic curve
mobile devices
Compositionality
mobile nodes
adequate security
Bilinear Pairing
Deniable authentication
heavy computational communication overhead
IBDA protocol
identity-based cryptography
identity-based cryptosystem
secure identity-based deniable authentication protocol
manet privacy
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
Android Malware Detection
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
invasive software
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
malware family classification
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
privacy
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
computer network security
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
wireless sensor networks
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
cyber world
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
CPS infrastructure
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
security of data
Access Control
Kernel
mobile computing
system monitoring
Resiliency
pubcrawl
composability
privacy
cyber-physical systems
Containers
smart phones
Mobile communication
mobile devices
ios
attack prevention mechanisms
confinement architecture
containment principle
custom sandbox profiles
third party application
confinement
biblio
Security of Gestures Based CAPTCHAs
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
security
Servers
pubcrawl
Human behavior
Software
composability
mobile computing
invasive software
Security analysis
Mobile handsets
mobile devices
gesture recognition
captchas
Accelerometers
CAPTCHA
gestures
Smartphones
accelerometer
gyroscopes
mobile gesture CAPTCHA
security.
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
security of data
security
Servers
pubcrawl
Human behavior
performance evaluation
composability
mobile computing
invasive software
Mobile handsets
human computer interaction
smart phones
mobile devices
Smartphones
security mechanism
gesture recognition
usability
malware
captchas
accelerometer readings
Accelerometers
CAPTCHA
gesture CAPTCHA challenge
gestures
gyroscope data
gyroscopes
network resources
sensor readings
Usability.
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
Protocols
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
5G mobile communication
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
clean separation
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
MobilityFirst future Internet architecture
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Internet of Things
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
cyber physical systems
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
Android devices
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Mobile Apps
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
1
2
3
4
5
6
7
8
next ›
last »