Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Survey on Fake Profile Detection on Social Sites by Using Machine Learning Algorithm
Submitted by grigby1 on Mon, 11/29/2021 - 1:33pm
pubcrawl
Support Vector Machine(SVM)
Support vector machines
supervised machine learning
Spam Profile
Social network services
Social Agents
Skin
security issues
Scalability
Artificial Neural Networks(ANNs)
Naïve byes
machine learning algorithms
machine learning
Human Factors
feature extraction
Fake Profile
Decision trees
Decision Tree
Bots Accounts
biblio
Privacy Policy in Online Social Network with Targeted Advertising Business
Submitted by grigby1 on Tue, 10/12/2021 - 2:54pm
advertising
data privacy
Human behavior
online social network
privacy
Privacy Policies
pubcrawl
Scalability
Social network services
Targeted Advertising
biblio
Execution of Big Data Analytics in Automotive Industry using Hortonworks Sandbox
Submitted by grigby1 on Wed, 05/05/2021 - 12:57pm
Databases
Social network services
Scalability
sandboxing
pubcrawl
policy-based governance
mining
Map Reduce
Industries
automobile industry
composability
collaboration agreements
collaboration
Business
Big Data
Automotive engineering
automobiles
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
notification platform
whatsapp
Telegram
telecommunication traffic
SYN flood attacks
SSH brute force attacks
social networking (online)
Social network services
Snort
Servers
security of data
real-time systems
pubcrawl
policy-based governance
packet data traffic
administrator
Notification
NIDS notification System
NIDS
network intrusion detection system
IP networks
Intrusion Detection
Human Factors
Human behavior
Force
Floods
Death attacks
brute force attacks
attack time
attack port
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 1:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
smart cities
privacy-preserving OLAP-based big data analytics
OLAP-based Big Data Analytics
OLAP data cubes
OLAP analysis
OLAP aggregate privacy
Experiments and Analysis over Big Datasets
Emerging Big Data Applications
distributed privacy-preserving OLAP framework
Distributed Privacy-Preserving OLAP
big data framework
authoritative analytical tool
bioinformatics
big data privacy
social networks
Distributed databases
tools
Social network services
privacy preservation
Measurement
Big Data
privacy
Scalability
data privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Data mining
data analysis
security of data
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 11:39am
recommender systems
trust relevancy degree
Social trust
social network information
personalized recommendation technology
personalized recommendation
personal characteristics
novel personalized recommendation algorithm
matrix factorization
ecommerce
Dianping datasets
human trust
Human behavior
Matrix decomposition
electronic commerce
Trusted Computing
data sparsity
data science
collaboration
trust
Data mining
Filtering
Training
Prediction algorithms
internet
social networking (online)
Social network services
collaborative filtering
pubcrawl
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
1
2
3
4
5
6
7
next ›
last »