Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
social media analysis
file
BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying
Submitted by JasonGigax on Wed, 06/22/2022 - 1:36pm. Contributors:
Yasin Silva
Deborah Hall
Huan Liu
Project Highlight Slides
Cyberbullying Detection
data science
Social Behavioral and Economics Sciences
social media analysis
Usability and Human Interaction
2036127
SaTC PI Meeting 2022
file
BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying
Submitted by JasonGigax on Mon, 06/20/2022 - 10:22am. Contributors:
Yasin Silva
Deborah Hall
Huan Liu
Posters
data science
Social Behavioral and Economics Sciences Usability and Human Interaction Cyberbullying Detection
social media analysis
2036127
SaTC PI Meeting 2022
Poster
biblio
Understanding Types of Cyberbullying in an Anonymous Messaging Application
Submitted by grigby1 on Thu, 01/31/2019 - 11:20am
anonymous message exchanges
anonymous messaging
pubcrawl
resilience
Resiliency
Scalability
social media analysis
topic models
types of cyberbullying
biblio
"Enhancing Network Security by Software Vulnerability Detection Using Social Media Analysis Extended Abstract"
Submitted by abfox on Tue, 02/14/2017 - 1:21pm
online service
web services
vulnerable target
unknown security vulnerability
Twitter
software vulnerability detection
software reliability
social networking (online)
social media analysis
security of data
real-time systems
real-time social media stream
pubcrawl170101
post-incident intrusion detection
Pattern recognition
attacked target system
network security
media streaming
Media
Intrusion Detection
firewalls
firewall
exposures database
detecting attack
database management systems
Crowd-based
common vulnerability
Automatic Network Configuration
automated reconfiguration