Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Text Mining
biblio
Natural Language Processing on Diverse Data Layers Through Microservice Architecture
Submitted by aekwall on Mon, 02/22/2021 - 1:40pm
Scalability
Resiliency
Human behavior
pubcrawl
Databases
Distributed databases
relational databases
microservices
Memory
arrays
natural language processing
sentiment analysis
Text Mining
Distributed NLP
Serverless API
biblio
Computational Approaches to Detect Illicit Drug Ads and Find Vendor Communities Within Social Media Platforms
Submitted by aekwall on Mon, 01/11/2021 - 1:39pm
drugs
Text Mining
Opioid Abuse Epidemic
Illicit Drug Ads
Flickr
community detection
Bipartite graph
social media
Deterrence
Scalability
deep learning
machine learning
pubcrawl
Human behavior
Resiliency
Electronic mail
Support vector machines
biblio
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
policy documents
time division multiplexing
Text Mining
text analysis
state owned capital layout adjustment
soft computing method
Semantics
Security Policies Analysis
pubcrawl
policy-based governance
policy text analysis
policy elements
causal relationships
partial association test
natural language processing
Layout
latent semantic analysis
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
fuzzy association rule mining
FARM
Data models
Data mining
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 11:12am
privacy
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
malware family classification
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
invasive software
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
Android Malware Detection
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
biblio
Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
iOS Security
User Reviews Analysis
US App Store
Text Mining
software maintenance
software evolution
requirement engineering
preliminary user reviews study on most downloaded iOS apps
mobile app reviews
mining
differentiate reviews
App Store Analytics
analyzing user reviews
643 user reviews
300 user reviews
15 most downloaded iOS apps
security
Google
Software algorithms
operating systems (computers)
Compositionality
Metrics
mobile computing
software quality
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Forestry
Data mining
biblio
New TSBuilder: Shifting towards Cognition
Submitted by aekwall on Mon, 05/18/2020 - 10:56am
supervised machine learning
cognition
artificial thinking
human thinking
multilayer Rosenblatt perceptron
natural language texts
new TSBuilder
rigid categorization
rigidity
Biological neural networks
term length
term system builder
term system building
term system construction
Text Mining
TSBuilder
word terms identification
Scalability
neural network
Data mining
natural language processing
text analysis
machine learning
Decision Making
Neurons
standards
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Task Analysis
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Text Mining
social networking site Twitter.com
social networking (online)
social media data mining
social media
situational awareness
sentiment analysis
security relevant information retrieval
security of data
Resiliency
resilience
Ransomware
pubcrawl
Metrics
composability
internet
information retrieval
Data mining
data analytics techniques
data analysis
data aggregation
cybersecurity tweet dataset
Cybersecurity
cyberattack
cyber threat landscape
cyber situational awareness information
cyber situational awareness
cyber risk
Cyber Attacks
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
next ›
last »