Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Twitter
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 2:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
A challenge of authorship identification for ten-thousand-scale microblog users
Submitted by BrandonB on Mon, 05/04/2015 - 2:23pm
Internet security issues
Twitter
Training
ten-thousand-scale microblog users
social networking (online)
security of data
security
microblog texts
microblog
authorship attribution
internet
Distance measurement
Computers
Blogs
Big Data
authorship identification
authorship detection
biblio
Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?
Submitted by BrandonB on Thu, 04/30/2015 - 1:42pm
Twitter network
Twitter applications
Twitter
Trusted Computing
Syntactics
social networking (online)
sentiment-related factors
Semantics
principal component analysis
Nominations and elections
Indian election
Conferences
bot detection
AUROC
area under the ROC curve
« first
‹ previous
1
2
3
4