Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Access control Engineering & Materials Science
Feature extraction Engineering & Materials Science
Cloud computing Engineering & Materials Science
Cryptography Engineering & Materials Science
Communication Engineering & Materials Science
Mobile cloud computing Engineering & Materials Science
Social Media Mathematics
Experiments Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2000 2019

Using social media to understand cyber attack behavior

Sliva, A., Shu, K. & Liu, H., Jan 1 2019, Advances in Human Factors, Business Management and Society - Proceedings of the AHFE 2018 International Conference on Human Factors, Business Management and Society, 2018. Springer Verlag, p. 636-645 10 p. (Advances in Intelligent Systems and Computing; vol. 783).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Experiments

#metoo through the lens of social media

Manikonda, L., Beigi, G., Kambhampati, S. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 104-110 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Lens
Lenses
Comparative Analysis
Sharing

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital storage
Internet protocols
Network management
Distributed computer systems
Critical infrastructures