Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
smart phones
biblio
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Submitted by
grigby1
on Tue, 11/26/2019 - 2:35pm
authentication
resilience
pubcrawl
Human behavior
Resiliency
Scalability
Human Factors
Android (operating system)
authorisation
mobile computing
smart phones
pattern matching
human factor
ALP
cluster
cluster based progressive smart lock
dependent combination
mobile phone user
multiple cluster based pattern match system
multiple cluster-android lock patterns
Pattern
progressive authentication service
single authentication system
smart android mobile phone
smart lock facilities
smart phone authentication
Smart phone lock
pattern locks
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by
grigby1
on Tue, 11/26/2019 - 2:34pm
privacy
authentication
data privacy
testing
resilience
pubcrawl
Human behavior
Resiliency
Scalability
Human Factors
android
authorisation
mobile computing
smart phones
Global Positioning System
user privacy
data analysis
Wireless fidelity
wireless LAN
authentication mechanism
human factor
mobility features
Context
Context Data
context data analysis
Ease of Use
environmental context recognition
GPS location
invulnerable environment
lock screen application
pattern locking recognition
secure login implementation
smartphone application
Wi-Fi Mac Address
pattern locks
biblio
Design and Implementation of Hormonal Cycle Based Cryptographic Modus Operandi and Android Application Development for Cosseted Transmission
Submitted by
aekwall
on Mon, 11/25/2019 - 1:01pm
Analogies and Transference
Android application
android application development
biological principle
cosseted transmission
cryptographic modus operandi
Cryptography
entwined contemporary subsistence
female hormones
Follicle Stimulating Hormone
hormonal cycle
hormonal system
Hormone
Human behavior
Human Factors
male hormones
mobile computing
numerous hormones
pubcrawl
safekeeping echelon
smart phones
biblio
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement
Submitted by
aekwall
on Mon, 11/11/2019 - 10:48am
Cloud Computing
Compliance
computer science
data privacy
GDPR
Human behavior
Informatics
Internet of Things
Internet of Things devices
IoT devices
IoT manufacturers
IoT policy
IoT privacy policy
IoT privacy policy agreement
mobile computing
policy test bed
privacy
Privacy Policies
privacy policy agreement
pubcrawl
Scalability
security
security of data
smart phone
smart phones
test bed
test equipment
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by
aekwall
on Mon, 11/04/2019 - 10:23am
Cryptography
data confidentiality
encryption
performance evaluation
embedded systems
embedded devices
mobile computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
Databases
Data protection
smart phones
relational databases
storage security
Performance
storage management
mobile devices
relational database security
RDBMS
commodity multicore processors
device processing resources
full disk encryption
handheld devices
light database encryption design
massive storage systems
multicore CPU
Multicore processing
multiprocessing systems
parallel database encryption system
parallel databases
SQLite databases
SQLite RDBMS
SQLite-XTS
user sensitive data
XTS encryption
biblio
Identification of Distributed Malware
Submitted by
grigby1
on Mon, 06/10/2019 - 12:59pm
android
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
generic viruses
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
malware prevention
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
public domain software
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
biblio
Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Submitted by
aekwall
on Mon, 06/10/2019 - 9:17am
Ad hoc networks
composability
data privacy
edge network assistance
flow routing optimization problem
identifying apps
MANET Attack Mitigation
Metrics
mobile ad hoc networks
mobile computing
multipath routing scheme
privacy
probability
pubcrawl
Relays
Resiliency
Routing
security
smart phones
smartphone apps
smartphone sales
Smartphones
splitting traffic
telecommunication network routing
telecommunication security
telecommunication traffic
traffic analysis attack mitigation
traffic morphing
user security
wireless sensor networks
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by
grigby1
on Wed, 05/01/2019 - 10:33am
Cameras
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Image edge detection
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
Resiliency
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Traffic congestion
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
biblio
Extracting the Security Features Implemented in a Bluetooth LE Connection
Submitted by
aekwall
on Mon, 04/01/2019 - 9:06am
computer network security
encryption
Protocols
mobile computing
feature extraction
Resiliency
Human behavior
pubcrawl
composability
smart phones
Data mining
Bluetooth
Bluetooth devices
Bluetooth LE connection
Bluetooth LE devices
Bluetooth LE security
bluetooth low energy
Bluetooth Smart
Bluetooth special interest group
Frontline BPA Low Energy Analyzer
bluetooth security
biblio
Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Submitted by
aekwall
on Mon, 03/11/2019 - 9:38am
actionable trustworthiness assessment
Apple App store
application marketplaces
automatic trustworthiness frameworks
automating trustworthiness assessment
composability
comprehensive trustworthiness assessment
Data collection
data privacy
Google
Google Play store
holistic personalized trustworthiness score
intuitive trustworthiness assessment
malicious developers
malware
Mobile Applications
mobile computing
Mobile Security
potentially sensitive data
privacy
privacy health
pubcrawl
publicly available factors
risky apps
security
security assessment
security of data
smart phones
tools
transparent trustworthiness score
trust
Trust4App framework
Trusted Computing
trustworthiness
trustworthiness indicators
user reviews
1
2
3
4
5
6
7
8
9
next ›
last »