Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
smart phones
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Prototype of a Li-Fi Communication System for Data Exchange Between Mobile Devices
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
android encryption
android
Human behavior
Li-Fi
light emitting diodes
light fidelity
Metrics
Prototypes
pubcrawl
resilience
Resiliency
Scalability
simplex communication
smart phones
Software
transceivers
VLC
Wireless fidelity
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
android encryption
asymmetric encryption/decryption algorithm
Complexity theory
computer security
Cybersecurity
Diffie-Hellman algorithm
encryption
Energy Efficiency
Human behavior
Metrics
pubcrawl
resilience
Resiliency
RSA
Scalability
smart phones
Software
Software algorithms
Temperature measurement
wireless transmission
biblio
E-Voting System In Smart Phone Using Mobile Application
Submitted by grigby1 on Thu, 01/28/2021 - 12:32pm
android encryption
Aes256
AES256 algorithm
Android platform
Androids
biometric
casted vote count
computer science
Cryptography
e-voting system
electronic voting
encryption
fraud
fraud voters
government data processing
Human behavior
Humanoid robots
internet
Metrics
Mobile Application
mobile computing
OTP
polling booth
pubcrawl
resilience
Resiliency
Scalability
Servers
smart phone
smart phones
voting process
Web technologies
biblio
Independent credible: Secure communication architecture of Android devices based on TrustZone
Submitted by grigby1 on Thu, 01/28/2021 - 12:32pm
android encryption
android
computer architecture
computer science
Cryptography
ECDH
encryption
Hardware
Human behavior
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
smart phones
TEE
TrustZone
biblio
Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
Submitted by grigby1 on Thu, 01/28/2021 - 12:32pm
android encryption
Cameras
Conferences
Cryptography
data privacy
encryption
fully homomorphic encryption scheme
Human behavior
Metrics
mobile cameras
mobile computing
modern mobile devices
privacy-preserving method
privacy-preserving mobile video sharing
pubcrawl
resilience
Resiliency
Scalability
smart phones
Software
times people
video sharing software
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
android encryption
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
certificate forging
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
inter-process communication
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
Quadroot
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 10:27am
acoustic
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
composability
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
digital versatile discs
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
novel acoustic covert channel
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
biblio
AMDroid: Android Malware Detection Using Function Call Graphs
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
AMDroid
Android (operating system)
Android Malware Detection
API calls
application program interfaces
countless malicious applications
FCGs
feature extraction
function call graph
function call graphs
graph kernels
graph theory
Human behavior
invasive software
Kernel
learning (artificial intelligence)
machine learning
malware
Malware Analysis
Metrics
mobile internet
mobile operating system
opcode sequences
privacy
pubcrawl
resilience
Resiliency
Semantics
smart phones
static analysis
structural semantic learning
biblio
Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning
Submitted by grigby1 on Fri, 12/11/2020 - 1:32pm
analytical workload
Android malware
application program interfaces
detection algorithms
Face
familial analysis
feature extraction
GefDroid
graph embedding
graph embedding techniques
graph theory
Human behavior
invasive software
learning (artificial intelligence)
malware
Malware Analysis
malware link network
Metrics
pattern classification
pattern clustering
privacy
pubcrawl
resilience
Resiliency
security
Semantics
similarity relationships
smart phones
SRA
supervised learning
Unsupervised Learning
1
2
3
4
5
6
7
8
9
…
next ›
last »