Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Social network services
biblio
Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles, Practice, and Experiences
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
tools
security of data
data analysis
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
data privacy
Scalability
privacy
Big Data
Measurement
privacy preservation
Social network services
smart cities
Distributed databases
social networks
big data privacy
bioinformatics
authoritative analytical tool
big data framework
Distributed Privacy-Preserving OLAP
distributed privacy-preserving OLAP framework
Emerging Big Data Applications
Experiments and Analysis over Big Datasets
OLAP aggregate privacy
OLAP analysis
OLAP data cubes
OLAP-based Big Data Analytics
privacy-preserving OLAP-based big data analytics
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 1:15pm
Clustering algorithms
Computing Theory
false social relationships
Fans
feature extraction
graph theory
Human behavior
Human Factors
low trusted user
malicious users
Manuals
microblog
Microblog platform
microblog user credibility evaluation algorithm
network topology
online social network
online social networking platform
optimisation
pruning algorithm
pubcrawl
seed node selection algorithm
Social network services
social networking (online)
trust
trust propagation
Trusted Computing
trustworthiness-based user credibility evaluation algorithm
two-way propagation trust scoring
Uniform resource locators
user credibility assessment
user social relationship graph
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 10:39am
Trusted Computing
pubcrawl
collaborative filtering
Social network services
social networking (online)
internet
Prediction algorithms
Training
Filtering
Data mining
trust
collaboration
data science
data sparsity
recommender systems
electronic commerce
Matrix decomposition
Human behavior
human trust
Dianping datasets
ecommerce
matrix factorization
novel personalized recommendation algorithm
personal characteristics
personalized recommendation
personalized recommendation technology
social network information
Social trust
trust relevancy degree
biblio
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection
Submitted by grigby1 on Thu, 10/29/2020 - 10:12am
Android Malware Detection
Androids
ARPaD
bank accounts
cyber criminals
Data mining
Human behavior
Humanoid robots
internet
invasive software
legitimate application
LERP-RSA
malware
malware classification
malware dataset
malware detection
malware families
malware family classification
Metrics
mobile computing
mobile devices
Mobile handsets
mobile phones
mobile users
multivariate all repeated pattern detection
Payloads
privacy
pubcrawl
randomly selected malware applications
resilience
Resiliency
smart phones
smartphone users
Social network services
Text Mining
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
Computer crime
feature extraction
Human behavior
pubcrawl
Social network services
social networking (online)
Cybersecurity
Companies
Economics
Data mining
cognition
cyber threats
Text Mining
Pricing
abnormal behavior
Cognitive Hacking
financial market
financial social media messages
Information Gain
potential cognitive hacking attacks
price movements
social media
stock markets
stock movements
textual features extraction
Human Behavior and Cybersecurity
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
Scalability
data privacy
Conferences
security
Resiliency
Human behavior
pubcrawl
privacy
Social network services
Computational modeling
social networking (online)
social network
complex networks
information theory
privacy protection
Sensitivity
Social Behavior
behavioural sciences computing
privacy awareness
decision process
driving force
Habitual privacy
highly dynamical network behaviors
network evolutions
networked human society
privacy disclosure behavior
privacy driven model
social behavior network
Computing Theory and Privacy
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:39pm
Computing Theory
trust
bitcoin
composability
Compositionality
Computer Theory and Trust
Decision Making
fuzzy set theory
interdisciplinary research area
Internet of Things
Measurement
pubcrawl
security of data
set theory
SIoT
Social Internet of Things
Social network services
social networking (online)
social relationship
soft set theory
soft-set theory
trust decision making
Trusted Computing
trusted nodes
trustworthy node
trustworthy relationships
weighted based trustworthiness ranking model
wireless sensor networks
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
pubcrawl
Resiliency
security
computer science
invasive software
botnets
Metrics
Compositionality
Probabilistic logic
probabilistic model
probability
Social network services
social networking (online)
social media networks
social media
Sociology
Statistics
game theory
botnet
social media platforms
Physics
deterministic propagation actions
social botnet
social botnet effectiveness
social media botnets
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
Servers
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
internet
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
Windows
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
nonreadable contents
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 10:20am
telecommunication security
Resiliency
pubcrawl
composability
vehicular ad hoc networks
Peer-to-peer computing
Social network services
Computational modeling
VANET
Topology
mobile ad hoc networks
telecommunication network topology
trust model
Web pages
Intelligent Transportation Systems
web of trust
BayesTrust
cooperative intelligent transport system
explicit link structure
global trust relationships
implicit Web of trust
IWOT-V
local trust information
local trust relationships
pagerank
random topology
social trust relationship
threat models
untrusted nodes
VehicleRank
vehicular ad hoc network
Web page ranking algorithms
1
2
3
4
5
6
next ›
last »