Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
text analysis
biblio
E-Mail Classification Using Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
k-means algorithm
Word2Vec algorithm
Word2Vec
Web page memberships
unsupervised training model
unsolicited e-mail
Tokenization
test phase M3 model
Skip Gram
serious communication tool
reminders
Electronic mail
e-mail classification
business correspondence
academic notices
Scalability
Unsupervised Learning
k-means
natural language processing
spam e-mails
Postal services
text classification
text analysis
pattern classification
pubcrawl
Human behavior
Resiliency
Support vector machines
Classification algorithms
biblio
Inflectional Review of Deep Learning on Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
natural language processing
Time Delay Neural Networks
text analysis
Task Analysis
tagging
Semantics
Scalability
Resiliency
recurrent neural network
recurrent neural nets
pubcrawl
processing layers
nonlinear process
NLP tools
NLP process
-Deep Learning
Multitask Learning
MultiLayer Neural Network
learning (artificial intelligence)
Human behavior
DL methods
Deep nural Network
deep learning
convolution neural networks
contemporary time NLP
Considering Deep
Artificial Neural Networks
artificial neural network
(DL) method
biblio
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
phishing attack detection
unsolicited e-mail
Uniform resource locators
text analysis
social engineering
Semantics
security threats
Scalability
Resiliency
pubcrawl
phishing emails
blacklisting
Phishing
natural language text
natural language processing
malicious intent detection
machine learning
learning (artificial intelligence)
inappropriate statements detection
Human behavior
Electronic mail
Computer crime
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
biblio
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
privacy models and measurement
user modeling
Urban areas
text analysis
standards
social networks
social networking (online)
Social network services
pubcrawl
privacy settings
Adaptation
privacy
Metrics
machine learning
location sharing
location based services
fine-grained disclosement policy
data privacy
Current measurement
biblio
Classifying Phishing Email Using Machine Learning and Deep Learning
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
one-hot encoding
Web sites
unsolicited e-mail
text analysis
Support vector machines
Semantics
pubcrawl
phishing emails
phishing email
Phishing
pattern classification
Computer crime
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
encoding
email text
Electronic mail
deep semantic analysis
deep learning
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Dynamic searchable encryption
resilience
Resiliency
composability
pubcrawl
Trusted Computing
text analysis
search problems
search pattern hiding
link-list structures
keyword searching
encrypted critical data
dynamic searchable symmetric encryption
Cryptography
DSSE systems
data encapsulation
blind storage
searchable encryption
untrusted cloud server
privacy
storage management
Servers
Indexes
Cloud Computing
encryption
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Document Typist Identification by Classification Metrics Applying Keystroke Dynamics Under Unidealised Conditions
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
keystroke analysis
Typist identification
text detection
text analysis
rhythm
pubcrawl
password
Minkowski metric
Minkowski distance
Metrics
Measurement
keystroke dynamics
Chebyshev approximation
Keyboards
image classification
Human Factors
Human behavior
feature extraction
document typist identification
document image processing
Distance metrics
Databases
classification metrics
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »