Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
social media
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Studying the Dark Triad of Personality Through Twitter Behavior
Submitted by grigby1 on Fri, 11/03/2017 - 11:28am
personality
pubcrawl
Human behavior
Human Factors
dark triad
social media
Twitter
User profiling
dark web
biblio
Anonymity, Intimacy and Self-Disclosure in Social Media
Submitted by grigby1 on Tue, 08/22/2017 - 11:40am
anonymity
composability
Human behavior
intimacy
Metrics
pubcrawl
Resiliency
self-disclosure
social media
valence
biblio
Phishing Susceptibility Detection Through Social Media Analytics
Submitted by grigby1 on Mon, 04/24/2017 - 11:44am
Human behavior
Phishing
phishing attack
Phishing Susceptibility
pubcrawl
social media
Spear Phishing
biblio
De-identifying facial images using projections on hyperspheres
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial image recognition
visualization
video sharing
social media
pubcrawl170113
privacy
Media
mass visual media distribution
malicious users
image classification
hyperspheres
automatic facial image identification
facial image deidentification
facial image classification
face recognition
Face
Error analysis
Databases
data privacy
common automatic identification algorithm
cloud services
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
« first
‹ previous
1
2
3
4