Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
privacy protection
Computing Theory and Privacy
social behavior network
privacy driven model
privacy disclosure behavior
networked human society
network evolutions
highly dynamical network behaviors
Habitual privacy
driving force
decision process
privacy awareness
behavioural sciences computing
Social Behavior
Sensitivity
Scalability
information theory
complex networks
social network
social networking (online)
Computational modeling
Social network services
privacy
pubcrawl
Human behavior
Resiliency
security
Conferences
data privacy
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 11:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
intrinsic content security
content communication
content naming
Content Replacement
content store data structure
Content Store Management
in-network caching
infotainment-rich commute experience
infrastructure network elements
cache replacement mechanisms
multimetric cache replacement policies
multimetric CS management mechanism
NDN-driven VANET
Vehicular Named Data Network
vehicular networks
vehicular social networks
VNDN communications
Named Data Network Security
social networking (online)
security
Resiliency
Human behavior
pubcrawl
Roads
vehicular ad hoc networks
simulation
Social network services
Scalability
internet
data structures
Measurement
computer networks
named data networking
cache storage
Intelligent Transportation System
Intelligent Transportation Systems
biblio
A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 3:02pm
recurrent neural nets
U.S. technology companies
Twitter
TRNN
text sequence dependency
temporal recurrent neural network approach
stock markets
social networking (online)
Social network services
social media
Sequence Prediction
security of data
Resiliency
resilience
Recurrent neural networks
recurrent neural network
Anomaly Detection
pubcrawl
policy-based governance
Neural Network Security
Metrics
market anomaly attacks detection
learning (artificial intelligence)
financial stocks markets
financial social media messages
financial market security
feature extraction
deep learning approaches
commodities markets
collaboration
Cognitive Hacking
Artificial Neural Networks
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »