Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tagging
biblio
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
Submitted by grigby1 on Thu, 03/28/2019 - 2:15pm
defense strategies
signature based defense
tagging
suspicious information
signature-based antivirus systems
refinable attack investigation framework
realworld attack dataset
RAIN framework
optimal adversary
nonadversarial information tracking
multistage game
memory overhead
information flow passes
dynamic information flow tracking games
DIFT games
security
adversarial information flows
Resiliency
Cyber Attacks
firewalls
Stochastic processes
game theory
Scalability
pubcrawl
Monitoring
resilience
Games
Computational modeling
Analytical models
security of data
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by grigby1 on Wed, 05/30/2018 - 3:11pm
personalized recommendation
user interest mining
tagging
social tagging users
social tagging recommendation
social networking (online)
Social Agents
Servers
self-adaptive recommendation strategy
self-adaptive recommendation
Scalability
resource management
recommender systems
pubcrawl
personalized recommendation strategy
Adaptation models
multi-agent systems
intelligent social tagging recommendation system
information retrieval
Human Factors
Human behavior
Filtering
equilibrium selection
Data models
Data mining
computer architecture
common preference group recommendation strategy
common preference group recommendation
Agent technology
biblio
Secure Composition of PKIs with Public Key Protocols
Submitted by K_Hooper on Wed, 02/28/2018 - 10:32am
Public key
tools
telecommunication security
tagging
symbolic model
symbolic formal models
secure composition
public key protocols
public key infrastructures
public key cryptography
Composition
pubcrawl
Protocols
PKI
formal method
encryption
Cryptographic Protocols
Computational modeling
Compositionality
biblio
Large-scale Affective Content Analysis: Combining Media Content Features and Facial Reactions
Submitted by grigby1 on Tue, 01/23/2018 - 3:02pm
large-scale affective content analysis
visualization
Videos
tagging
Software
sentiment analysis
Resiliency
pubcrawl
multimodal fusion model
media content features
media clips
Media
AU-2
image classification
feature extraction
facial responses
facial reactions
face recognition
encoding
deep visual-sentiment descriptors
content management
composability
Automated Response Actions
automated facial action measurements
biblio
Semantic Properties of Customer Sentiment in Tweets
Submitted by BrandonB on Tue, 05/05/2015 - 12:27pm
textual documents
Semantics
sentiment analysis
social networking (online)
tagging
text analysis
text analytics
Text Mining
textual data semantic properties
retail data processing
topic modeling
topic modeling algorithm
tweet analysis
tweet semantic patterns
Twitter
US retail companies
Vectors
Business
pattern clustering
part-of-speech tagging
online social networking services
Media
latent Dirichlet allocation
K-means clustering methods
document similarity
Data mining
customer sentiment semantic properties
cosine similarity
Correlation
consumer sentiment polarities
consumer opinions
consumer behaviour
clustering
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 12:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 5:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
« first
‹ previous
1
2