Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Facebook
biblio
Categorical Classification and Deletion of Spam Images on Smartphones Using Image Processing and Machine Learning
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
machine learning
whatsapp
unsolicited e-mail
spam images
social networking (online)
Smartphones
smart phones
Scalability
pubcrawl
privacy
Optical character recognition software
mobile device
mobile computing
media exchange
manual deletion
categorical classification
learning (artificial intelligence)
Image Processing
image classification
Histograms
feature extraction
Facebook
face recognition
Face
exponential rate
Electronic mail
data deletion
communication apps
classification
categorical deletion
biblio
PACMAN: Personal Agent for Access Control in Social Media
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personal agent
standards
social networking (online)
social media
social context
Social Agents
Scalability
recommender systems
pubcrawl
privacy
personalized access control decisions
personal assistant agent
personal agent for access control
Access Control
PACMAN
multi-agent systems
Media
machine learning
Internet/Web technologies
internet
Human Factors
Human behavior
friend network
Facebook
authorisation
appropriate audience selection
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Using synthetic data to train neural networks is model-based reasoning
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
Captcha-breaking architecture
human beings
wikipedia
Training
task-specific posterior uncertainty
synthetic-data generative model
synthetic training data
proposal distribution generator learning
Neural networks
neural network training
neural network parameter optimization
neural network generalization
model-based reasoning
Facebook
Computational modeling
pubcrawl
Bayesian model-based reasoning
approximate inference
captchas
CAPTCHA
neural nets
Generators
social networking (online)
Web sites
Training data
learning (artificial intelligence)
Data models
composability
Human Factors
Human behavior
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences
biblio
Friend or Foe: Cyberbullying in Social Network Sites
Submitted by grigby1 on Fri, 05/19/2017 - 1:45pm
collaboration
composability
cyberbullying
Deterrence
deterrence theory
Facebook
Human behavior
intentions
Metrics
neutralization theory
pubcrawl
Resiliency
sanctions
Scalability
shame
social network sites
biblio
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks
Submitted by grigby1 on Mon, 04/24/2017 - 11:45am
caller id applications
cross-application features
Facebook
Human behavior
over-the-top messaging applications
Phishing
phishing attack
phone numbers
pubcrawl
security
targeted attacks
truecaller
vanity numbers
vishing
biblio
Facial expression preserving privacy protection using image melding
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
image melding-based method
visualization
Visual privacy protection
Target recognition
social networking services
pubcrawl170113
privacy
image recognition
image quality degradation
Avatars
image context
facial regions
Facial features
facial expression preserving privacy protection
facial expression
Facebook
face recognition
Data protection
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
« first
‹ previous
1
2
3
next ›
last »