Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
An Efficient Algorithm for Minimal Edit Cost of Graph Degree Anonymity
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
online social networks
Switches
social networks
social networking (online)
Social network services
social network graphs
social network data
Resiliency
resilience
pubcrawl
privacy
personal privacy
optimization
anonymity
Metrics
Human Factors
Human behavior
Heuristic algorithms
graph theory
graph k-degree anonymity
dynamic programming
delete edges
degree anonymity
data privacy
composability
biblio
Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
original graph
uncertain graphs
uncertain graph
uncertain form
social-network data publishing
social-network data
social networking (online)
Social network services
Sensitivity
Scalability
Resiliency
pubcrawl
probability
privacy preserving
privacy
Perturbation methods
adversary knowledge
obfuscation algorithm
Human behavior
graph theory
general model
friendly-correlation preservation
differential privacy
data utility
data privacy
Correlation
composability
background knowledge attack
associated probability
algorithm privacy
Algorithm design and analysis
biblio
A graph-based trust-enhanced recommender system for service selection in IOT
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
IoT
Trusted Computing
trust
Temperature measurement
Social network services
Social Internet of Things
service selection problem
security of data
reliable service
recommender systems
pubcrawl
collaboration
Internet of Things
Human Factors
Human behavior
graph-based trust-enhanced recommender system
graph theory
control systems
computer theory
collaborative filtering recommendation algorithm
collaborative filtering
biblio
Implicit Trust Relation Extraction Based on Hellinger Distance
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
social networking (online)
Measurement
optimization
probability statistics
pubcrawl
Recommended system
recommender systems
social network
Social network services
matrix factorization model
social recommendation
social trust relationship extraction
trust
trust measure methods
Trusted Computing
user similarity
user-item bipartite networks
Human behavior
clear trust data
computer theory
Data mining
explicit social trust information
explicit trust data
gaussian distribution
graph theory
hellinger distance
actual explicit user trust ratings
Human Factors
implicit social relation extractions
implicit social relationship
implicit social trust
implicit trust relation extraction
Matrix decomposition
matrix factorization
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
pubcrawl
wikipedia discussions
unsupervised approach
Taste-based Similarity MANET
taste-based group
taste-based collaborative filtering technique
sub-group detection performance
Social networking sites
social networking (online)
Social network services
Social Mediadata
social media discussion data
sensors
Resiliency
resilience
Collabarative Filtering
privacy
p2p
Mobile powered sub-group detection/formation
mobile computing
Mobile communication
Metrics
MANET
implicit attitude
Global Positioning System
explicit attitude
debate discussion forum
computer science
Compositionality
collaborative filtering
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
A Data Streaming Approach to Link Mining in Criminal Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:45pm
security
pattern discovery
potential links
pubcrawl
public administration
real-time systems
Resiliency
resource management
Scalability
Metrics
similarity social network metrics
Social network services
social networking (online)
social networks
social networks analysis
stream processing approach
time-sensible scenarios
Apache Flink framework
Measurement
link mining
law enforcement agencies
Indexes
flexible data stream processing application
evolving criminal network
data streaming approach
data stream processing
Data mining
criminal networks
criminal link detection
criminal law
criminal actions
big data security metrics
Big Data Analytics
biblio
Topic Evolution Modeling in Social Media Short Texts Based on Recurrent Semantic Dependent CRP
Submitted by grigby1 on Tue, 02/06/2018 - 1:34pm
semantic dependent Chinese restaurant process
word co-occurrence modeling
Twitter dataset
topic modeling
tools
Text Mining
text analytics
text analysis
social networking (online)
Social network services
social media short texts
Social Media Analytics
short-text oriented topic evolution model
Semantics
semantic similarity information
Adaptation models
sdTEM
Scalability
rsdCRP
recurrent semantic dependent CRP
pubcrawl
Metrics
Media
LDA
Human Factors
Human behavior
HDP
Data models
composability
Analytical models
biblio
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics
Submitted by grigby1 on Tue, 02/06/2018 - 1:34pm
LERP-RSA
Text Mining
text analytics
Social network services
Scalability
pubcrawl
pattern detection
Noise measurement
Metrics
ARPaD
Human Factors
Human behavior
email analysis
Electronic mail
Digital Forensics
composability
arrays
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »