Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Targeted Poisoning Attacks on Social Recommender Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
computer security
Human Factors
Information systems
Motion pictures
optimization
pubcrawl
recommender systems
Resiliency
Scalability
Social network services
Sparse matrices
biblio
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 11:52am
Social network services
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Venn Diagram
Internet of Things
Social Media Mining
Media User Network
interactive visualization
Data visualization
Cybersecurity
computer science
Big Data
computer security
Scalability
biblio
Maximizing Social Welfare in Fractional Hedonic Games using Shapley Value
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
agent-based methods
Social Agents
Social Welfare
Shapley value-based welfare distribution scheme
Shapley value
player payoffs
optimal coalition structure
fractional hedonic games
decision rules
coalition generation problem
coalition formation
CFSV
Approximation algorithms
Scalability
3G mobile communication
social sciences
Benchmark testing
Human Factors
Stability analysis
Games
5G mobile communication
multi-agent systems
Social network services
graph theory
pubcrawl
game theory
biblio
Initial Weights Optimization Using Enhanced Step Size Firefly Algorithm for Feed Forward Neural Network Applied to Spam Detection
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Enhanced Step Size Firefly
feed forward neural network
Feeds
Human behavior
Human Factors
Initial Weight Optimization
Metrics
Neural networks
Neurons
optimization
pubcrawl
Scalability
Social network services
spam detection
Training
Uniform resource locators
biblio
Computational Stylometry and Machine Learning for Gender and Age Detection in Cyberbullying Texts
Submitted by grigby1 on Mon, 01/27/2020 - 12:29pm
Age Detection
Computational Stylometry
Cyberbullying Detection
feature extraction
Gender Detection
Human behavior
Human Factors
Linguistics
machine learning
Metrics
psychology
pubcrawl
Semantics
Social network services
stylometry
taxonomy
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
recommender systems
unified framework
Trusted Computing
trust-aware recommender systems
trust relationships
trust directions
sparse users
Social network services
security of data
Scalability
Resiliency
resilience
Adaptation models
recommendation quality
pubcrawl
Mathematical model
learning (artificial intelligence)
learn directive trust strength
Human Factors
Data models
Computational modeling
cold start
adaptive systems
adaptive method
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »