Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Blogs
biblio
Style-Aware Neural Model with Application in Authorship Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
Neural networks
writing style
Training
text analysis
syntax encoding
syntax
Syntactics
syntactic structure
syntactic representations
syntactic representation
stylometry
stylistic levels
style-aware neural model
semantic structure
pubcrawl
part of speech tags
attention-based hierarchical neural network
neural nets
neural model
natural language processing
Metrics
lexical representations
Human behavior
encoding
document information
Computational modeling
composability
Blogs
Benchmark testing
benchmark datasets
authorship attribution
attribution
biblio
An Enhanced Semantic-Based Cache Replacement Algorithm for Web Systems
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
Web traffics
Web systems
Web performance
Web page
web objects
Web items
Web Caching
web cache
typical replacement policies
Servers
Semantics
semantic-aware caching policy
semantic-aware
semantic distance
pubcrawl
Resiliency
resilience
replacement algorithm
Pollution
Metrics
internet
delays
caching solution
caching mechanism
cache storage
Cache replacement policy
cache replacement algorithm
Blogs
biblio
Comment Spam Detection via Effective Features Combination
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
Human behavior
Web sites
user experience
trees (mathematics)
spam detection
Scalability
pubcrawl
Metrics
internet
Human Factors
blog spam dataset
gradient boosting tree algorithm
feature extraction
feature combination
Detectors
Decision trees
comment spam detection
boosting
Blogs
biblio
Adversarial Authorship, Interactive Evolutionary Hill-Climbing, and Author CAAT-III
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Adversarial Authorship
Adversarial Stylometry
Artificial Intelligence
AuthorWebs
Blogs
computer science
feature extraction
Fingerprint recognition
Human behavior
Interactive Evolutionary Hill-Climbing
Metrics
pubcrawl
stylometry
testing
Writing
biblio
A transparent middleware for encrypting data in MongoDB
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
Blogs
Cloud Computing
Cryptography
database
dataset level
Educational institutions
Encrypting
middleware
MongoDB
MongoDB database
NoSQL
NoSQL database
relational databases
security vulnerability
sensitive data encryption
Transparent Middleware
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics
biblio
A challenge of authorship identification for ten-thousand-scale microblog users
Submitted by BrandonB on Mon, 05/04/2015 - 2:23pm
Internet security issues
Twitter
Training
ten-thousand-scale microblog users
social networking (online)
security of data
security
microblog texts
microblog
authorship attribution
internet
Distance measurement
Computers
Blogs
Big Data
authorship identification
authorship detection
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
« first
‹ previous
1
2