Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
social network analysis
biblio
Employing social network analysis to dark web communities
Submitted by grigby1 on Fri, 06/02/2023 - 4:32pm
pubcrawl
Analytical models
Computer crime
dark web
Data mining
directed graphs
Human behavior
Human Factors
Key nodes
organizational aspects
search engines
social interactions
social network analysis
social networking (online)
biblio
A Social Network Analysis and Comparison of Six Dark Web Forums
Submitted by grigby1 on Fri, 01/15/2021 - 12:24pm
network centrality analysis
whistle-blowing
underground communities
tools
Terrorism
structural patterns
social networking (online)
social network analysis tools
social network analysis
social interactions
pubcrawl
privacy
posting activities
post discussion data
online communities
central nodes post
interaction graphs
Instruction sets
Human Factors
Human behavior
Hacking
drugs
data privacy
dark Web forums
dark web
Cryptography
criminal interests
content ranging
Computer crime
biblio
Merging DoDAF architectures to develop and analyze the DoD network of systems
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
merging
Systems engineering and theory
system-to-system matrix
system architectures
network metrics
military communication
Joint Interoperability and Capability Development System process
DoD network of systems
DoD legacy systems
DoD leadership
DoD Information Network
DoD Architecture Framework products
Department of Defense
network accountability
computer architecture
information networks
US Department of Defense
open systems
social network analysis
interoperability
military computing
Software Architecture
Measurement
Metrics
social networking (online)
composability
pubcrawl
Resiliency
biblio
Securing Social Media User Data: An Adversarial Approach
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
Human behavior
pubcrawl
composability
Metrics
relational database security
data sharing
data utility
de-anonymization attack
heterogeneous data
social network analysis
user privacy
biblio
Andro-Simnet: Android Malware Family Classification Using Social Network Analysis
Submitted by grigby1 on Mon, 06/10/2019 - 2:01pm
pubcrawl
malware similarity
malwares attack behavior pattern
metamorphic malware
Metrics
mobile computing
mobile devices
pattern classification
polymorphic malware
privacy
malware family network aggregation
resilience
Resiliency
signature-based malware detection method
social network analysis
Social network services
social networking (online)
static analysis
tactical characteristics
graph visualization
Android (operating system)
Android malware family classification
behavior-based detection
Classification algorithms
detection algorithms
efficient malware classification
feature extraction
Generators
Andro-Simnet
high classification accuracy
Human behavior
invasive software
k-fold cross-validation
machine learning
malware
malware classification
malware dataset
biblio
Classification of Twitter Accounts into Automated Agents and Human Users
Submitted by grigby1 on Wed, 05/30/2018 - 4:12pm
account classification
automated agents
bot detection
Human behavior
Human Factors
pubcrawl
Scalability
Social Agents
social network analysis
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
Detecting Compromised Email Accounts from the Perspective of Graph Topology
Submitted by grigby1 on Tue, 09/19/2017 - 12:06pm
adaptive filtering
Compromised Accounts Detection
Human behavior
Metrics
pubcrawl
Scalability
social network analysis
spam detection
spam filtering
biblio
Personalized PageRank Estimation and Search: A Bidirectional Approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:05pm
personalized pagerank
personalized search
pubcrawl170201
social network analysis
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
1
2
next ›
last »