Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Social network services
biblio
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Scalability
psycholinguistic features
pubcrawl
Random Forest
regression analysis
Resiliency
Russian language
Russian legislation
Russian-speaking illegal text material
psych olinguistic features
semantic features
Semantics
Social network services
Support vector machines
Terrorism
text analysis
text classification
text detection
Human behavior
Bayes methods
classification methods
classification quality
Dictionaries
differentiating feature
extremist texts
feature extraction
gradient boosting
automatic extremist text detection
learning (artificial intelligence)
linear SVM
linguistic features
logistic regression
multinomial naive Bayes
natural language processing
pattern classification
Pragmatics
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication
biblio
Temporal analysis of radical dark web forum users
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
post polarity
temporal analysis
social networking (online)
Social network services
social media sites
sentiment analysis program
sentiment analysis
radical users
radical scores
radical dark Web forum users
radical actions
pubcrawl
POS tagger
Terrorism
internet
Data mining
dark web
Conferences
security of data
Human Factors
natural language processing
Human behavior
biblio
Detecting anomalies in Online Social Networks using graph metrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:02pm
Measurement
structural characteristic analysis
Stars
social networking (online)
Social network services
security of data
Regression
pubcrawl170111
personalized user profile
online social networks
Oddball algorithm
Anomaly
Image edge detection
graph theory
graph metrics
Fitting
feature extraction
Curve fitting
Cliques
Brokerage
anomaly activity detection
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
Cyber-deception and attribution in capture-the-flag exercises
Submitted by grigby1 on Tue, 03/07/2017 - 1:35pm
DEFCON CTF exercise data
Training
Support vector machines
Social network services
security of data
pubcrawl170109
Payloads
pattern classification
Logistics
capture-the-flag exercises
DEFCON capture-the-flag exercise data
Decision trees
Cyber-security
cyber-deception
cyber-attack
culprit attribution
Computer crime
classification techniques
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 1:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
Trustworthiness Management in the Social Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
network traffic
trustworthiness management
Trusted Computing
social networks
social networking concepts
social networking (online)
Social network services
social IoT
Social Internet of Things
reliable system
Reliability
Peer-to-peer computing
P2P networks
Analytical models
network scalability
Internet of Things
internet
information/service discovery
General
feedback exchange
distributed systems
distributed hash table structure
Computer Systems Organization
Computational modeling
Communication/Networking and Information Technology
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »