Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
text analysis
biblio
Surfacing collaborated networks in dark web to find illicit and criminal content
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
social network analysis
espionage
extremist contents
financial frauds
hyperlinks
illegal activities
illegal services
illicit content
knowledge base
law enforcement
onion Web sites
public Internet
drug markets
social obligation
socket connections
terrorist contents
text analysis
Tor crawling
Tor functions
Tor hidden services
Tor Network
Web crawler
Web Graph
child exploitation images
Human behavior
Human Factors
dark web
drugs
internet
Weapons
Crawlers
information retrieval
Terrorism
social networking (online)
automatic Web site searching
pubcrawl
child exploitation videos
child sexual abuse
collaborated networks
Computer crime
content selection
criminal content
Criminal Network
Dark Crawler
dark Web crimes
Databases
biblio
Investigating the {Discriminative} {Power} of {Keystroke} {Sound}
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
keystroke dynamics
virtual letters
virtual alphabet learning
user recognition
Training
text analysis
statistical features
statistical analysis
static text-based authentications
sound streams
score matching
pubcrawl170115
Presses
keystroke sound segments
Keystroke sound
keystroke dynamics modeling
Acoustics
keyboard typing
Keyboards
Histograms
free text-based authentications
feature extraction
discriminative power
directed graphs
digraph latency
continuous user authentication application
Continuous Authentication
authorisation
authentication decision
authentication
Acoustic signal processing
biblio
Finite Context Modeling of Keystroke Dynamics in Free Text
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
Context
Context modeling
Cryptography
finite context modeling
fixed short texts verification
free text analysis
keystroke dynamics analysis
password
pubcrawl170115
security
standards
text analysis
timing
Training
user verification
biblio
Classifying Text-Based Computer Interactions for Health Monitoring
Submitted by grigby1 on Wed, 03/08/2017 - 2:44pm
pervasive computing
healthcare provider
human computer interaction
Human-computer interaction
keystroke analysis
Monitoring
patient monitoring
pattern classification
personal health informatics
Healthcare
Pragmatics
Predictive models
PreMCI
premild cognitive impairment
pubcrawl170115
text analysis
unobtrusive method
aging
health monitoring
health care
Dementia
Data models
current assessment
continuous monitoring
constructed statistical model
computer interaction pattern
Computational modeling
cognitive impairment
cognitive function
classifying text-based computer interaction
classification rate
AUC
area under curve
biblio
A Survey on Document Image Binarization Techniques
Submitted by grigby1 on Wed, 03/08/2017 - 2:05pm
image contrast
text analysis
Segmentation
pubcrawl170111
performance evaluation metrics
Measurement
Mathematical model
image segmentation
image recognition
Image edge detection
adaptive contrast method
foreground text segmentation
document image recognition
document image processing
document image binarization techniques
document image binarization
document image analysis
distortion
degraded document image
background text segmentation
biblio
An analysis of ground truth binarized image variability of palm leaf manuscripts
Submitted by grigby1 on Wed, 03/08/2017 - 2:05pm
History
Variability
text analysis
Skeleton
pubcrawl170111
palm leaf manuscript images
Palm leaf manuscript
optimal binarization method
Measurement
Manuals
Image edge detection
Binarization
ground truthing process
Ground truth image
ground truth binarized image variability analysis
Frequency modulation
document image processing
document analysis system
cultural heritage
cultural differences
binarization evaluation metrics
biblio
A review on recent phishing attacks in Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
phishing attacks
Web sites
URL
unsolicited e-mail
Uniform resource locators
textual analysis
text analysis
Tabnapping
socially engineered messages
security
pubcrawl170109
phishing Website
phishing emails
Browsers
malware code
malware
invasive software
internet
illegal activity
email messages
email classification
Electronic mail
cyber-crime
Computer crime
Companies
biblio
"De-identification of Textual Data Using Immune System for Privacy Preserving in Big Data"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
immune systems
textual data de-identification
text analysis
specific immune system algorithm
security
pubcrawl170105
privacy preserving
privacy
Informatics
Big Data
Immune system
de-identification
data privacy
Data models
Data mining
Cryptography
CLONALG
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 11:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
biblio
Terms Mining in Document-Based NoSQL: Response to Unstructured Data
Submitted by BrandonB on Tue, 05/05/2015 - 1:30pm
document-based NoSQL
Viterbi algorithm
unstructured data storage
Unstructured Data Mining
topics mining
text analysis
terms mining
terms
term classification
Semantics
pattern clustering
pattern classification
NoSQL database
NoSQL
analytics-as-a-service framework
document handling
Dictionaries
Databases
database management systems
data mining techniques
Data mining
clustering
Classification algorithms
classification
Big Data
Big Bata
association rules
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »