Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public opinion
biblio
Media Forensics and DeepFakes: An Overview
Submitted by grigby1 on Thu, 04/08/2021 - 5:11pm
fake media
Media
multimedia computing
Deepfakes
Information integrity
data-driven forensic methods
deep learning tools
digital image forensics
elections
Videos
false multimedia content
forensic tools
Media Forensics
real media
realistic fake images
synthetic media
Video Forensics
visual media integrity verification
fraud
learning (artificial intelligence)
Digital Forensics
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
deep learning
security threats
neural nets
Forensics
software packages
public opinion
information forensics
generative adversarial networks
biblio
Twitter Opinion Mining and Boosting Using Sentiment Analysis
Submitted by grigby1 on Fri, 05/22/2020 - 2:44pm
public opinion
twitter sentiment classification
Twitter data
Task Analysis
Synset
social networking (online)
social media
SNLP
signal processing
sentiments
sentiment proportions
sentiment analysis
Scalability
Resiliency
resilience
Cameras
public conviction
pubcrawl
personal mood
pattern classification
opinions
opinion mining
natural language texts
natural language processing
Meta-level
Human behavior
Gold
exclusive entities
emotions
Data mining
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity