Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Media
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 2:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration
biblio
"Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds"
Submitted by grigby1 on Tue, 02/14/2017 - 12:30pm
GPU Shader
video filter
social networks
social networking (online)
pubcrawl170102
private sharing
privacy
multi-channel chained solutions
media data hiding
Media Data
Media
Markov cipher
image filter
Image coding
Big Data
format-compliant end-to-end privacy-preserving scheme
Format-Compliant
encryption
data privacy
data encapsulation
Cryptography
cloud services
cloud networks
Cloud Computing
cloud
Chaotic Mapping
big media data storage
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
"An edge based image steganography with compression and encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:01pm
Image coding
stego image distortion
Steganography
secret message
Secret key
pubcrawl170102
private key cryptography
Optical distortion
Media
MATLAB
LZW algorithm
Image edge detection
ART
Hash Function
encryption
embedded secret data
edge detection
edge based image steganography
data hiding capacity
data encryption
data compression
Cryptography
canny edge detector
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 1:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
biblio
Development of a keyboardless social networking website for visually impaired: SocialWeb
Submitted by BrandonB on Mon, 05/04/2015 - 11:33am
message authentication
Web Speech API
visually impaired people
user friendliness
STT conversion
speech to text conversion technologies
Speech recognition
Speech
SocialWeb
social networking (online)
Social network services
screen readers
screen reader
Acoustic Fingerprinting
Media
malicious attackers
keyboardless social networking Website
human computer interaction
handicapped aids
Fingerprint recognition
Computers
computer proficiency
Communities
Audio fingerprinting
Assitive technologies
assistive technologies
« first
‹ previous
1
2
3
4
5
6
7
8