Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Facebook
biblio
An approach to Privacy on Recommended Systems
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
user security
Expert Systems and Privacy
users personal information
referral systems
recommended systems
privacy protection techniques
online companies
website
expert systems
Europe
recommender systems
user privacy
Human Factors
security
data privacy
Companies
social networks
Data protection
internet
social networking (online)
Facebook
privacy
pubcrawl
Human behavior
History
Scalability
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
privacy
social networking (online)
Servers
self destructing data
security risks
security of data
security
Scalability
risk management
pubcrawl
privacy violations
privacy settings
privacy risks
Cryptography
OSN user
OSN server
OSN providers
online social networks
online social network users
internet
file servers
Facebook
delays
data privacy
data deletion
biblio
On Design and Implementation a Federated Chat Service Framework in Social Network Applications
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Human Factors
Social Agents
user profiles
switching cost
social network applications
service requests
Messengers
federated chat service framework
chat services
Prototypes
Switches
Scalability
Standards organizations
chatbots
internet
social networking (online)
Facebook
privacy
pubcrawl
mobile computing
Organizations
biblio
Efficient Privacy-Preserving User Identity with Purpose-Based Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
identity management systems
Scalability
resilience
purpose-based encryption
pubcrawl
Protocols
privacy-preserving user identity
Privacy-preserving
Privacy Policies
privacy
PII
personal identifiable information
identity propagation
attribute-based encryption
Identity management
Human behavior
General Data Protection Regulation
federated identity management
Facebook
encryption
Data protection
Cryptography
cloud services
cloud environment
Cloud Computing
authorization
biblio
Facebook’s Dystopian Definition of ‘Fake’
Submitted by willirn1 on Tue, 09/10/2019 - 11:45am
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Facebook
fake news
Cognitive Security
Articles of Interest
C3E 2019
biblio
Facebook Removes a Fresh Batch of Innovative, Iran-Linked Fake Accounts
Submitted by willirn1 on Fri, 09/06/2019 - 2:39pm
Science of Security
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Facebook
FireEye
Science of Security
Cognitive Security
Articles of Interest
C3E 2019
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
malicious activities
Twitter
Sybil SAN
sybil detection
sybil defenses
sybil attacks
social-activity networks
social networking (online)
social activity network
security of data
pubcrawl
perturbation theory
online social networks
Metrics
matrix perturbation theory
matrix algebra
activity attacks
low detection accuracy
Iterative methods
iterative algorithm
Image edge detection
graph-based sybil detection
graph theory
friendship attacks
fake accounts
Facebook
detection metric
detection algorithms
convergence
Computational modeling
composability
Algorithms
1
2
3
next ›
last »