Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Challenge Problems
Workshop Archives
Suggested Reading
Files
CPS-VO
»
Computational Cybersecurity in Compromised Environments (C3E)
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Anon
A. Endert
A. Y. Javaid
Aaron Jones
Abdul Rahman
Aggarwal, Palvi
Ahad, Ijaz
Alexander Nelson
Amelia Acker
Ana Moreira
Andrew Bushby
Andrew Rogers
Andy Greenberg
Angela Combs
Anthony Macera
Antonio Picariello
Austin Whipple
B. Biggio
B. Flatley
B. Simidchieva
Barford, Paul
Benjamin Sawyer
Bradshaw, Jeffrey M
Bradshaw, Jeffrey M.
Buchler, Norbou
C. Wang
Caleb Loverro
Caleb Townsend
Carolyn Crandall
Casey Newton
Cassenti, Daniel N
Chiyuan Zhang
Chris Bing
Christian Lebiere
Christoph Lipps
Christopher Kiekintveld
Cleotilde Gonzalez
Clint Watts
Cranford, Edward A
Cristiano De Faveri
Cynthia O. Dominguez
D. D. Woods
D. Last
D. Myers
D. S. LaFon
Dacier, Marc
Dan Woods
Daniel Fraunholz
Daniel Krohmer
Daniel Reti
Dave Bernard
Dave Climek
David Meier
David Rand
Deanna Caputo
Devin Coldewey
Dietterich, Thomas G.
Don Norman
Dorje Brody
Doron Kolton
Drew Robb
E. Peterson
Edward A. Cranford
Edward Amoroso
Erbacher, Robert F.
F. Roli
F. Yaman
Fang, Fei
Federico Pistono
Feltovich, Paul J.
Ferguson-Walter, Kimberly
Fidopiastis, Cali M.
Filippo Menczer
Frank Perbet
Frank Stech
Frederic Pohl
Fredrikson, Matt
Fugate, Sunny
g. fumera
G. Klien
George Hulme
Giancarlo Sperli
Giffin, Jon
Gomez, Steven R.
Gonzalez, Cleotilde
Gordon Grovitz
Gordon Pennycook
Gregory Barber
Gutzwiller, Robert
Gutzwiller, Robert S
H. Francis Song
Haifeng Xu
Hancock, PA
Hans Dieter Schotten
Hemant Purohit
Herbert Lin
Hoffman, Blaine E
Hoffman, Robert R
Ian Bogost
Isabel M. Trahan
J. J. Gallimore
J. Loyall
J. M. Bradshaw
J. Y. Haw
J. Yang
Jaclynn Kerr
Jajodia, Sushil
James Sanders
Jeff Grabmeier
Jeff Stone
Jessica Barber
Jha, Somesh
Jill Dougherty
Johnson, Matthew
Jonathan Katz
Jonker, Catholijn M.
Justin Mauger
Karl Levitt
Kaveh Waddell
Kelly Sheridan
Kelly Shortridge
Kevin Nauer
Khan, Riaz Ullah
Khan, Saad
Kimberly Ferguson-Walter
Kott, Alexander
Kristin Divis
Kristin Heckman
Kumar, Jay
Kumar, Rajesh
L. Chen
L. Didaci
Laurence Pitt
Lebiere, Christian
Lee Foster
Lerch, Javier F
Li, Jason
Lily Hay Newman
Lily Kuo
Linda Musthaler
Liu, Peng
Lucas Ropek
M Mitchell Waldrop
M. A. Kaafar
M. Atighetchi
M. Carvalho
Madni, Azad
Madni, Carla
Mancuso, Vincent
Marcus Gutierrez
Maria Korolov
Maria Temming
Mark Heckman
Mark Rockwell
Matt Bishop
Matthew Botvinick
Matthew H. Ryan
Matthew Stamm
Matthias Tammen
Maxine Major
Michael Trumbo
Michail Tsikerdekis
Mikaela Ashburn
Mike Elgan
Mikko Laitinen
Milind Tambe
Mohammad Sujan Miah
N. D. Truong
N. Soule
Nasir Memon
Nathaniel Gleicher
Neil C. Rabinowitz
Nicholas Kasdaglis
Nicole Lee
Ning, Peng
O. Kavehei
Omkar Thakoor
Oscar Veliz
Ou, Xinming
P. Damacharla
P. J. Feltovich
P. K. Lam
P. Russu
Paresh Dave
Paris Martineau
Parkinson, Simon
Patricia L. McDermott
Paul Bogdan
Pawel Korus
Peter Dizikes
Phebe Vayanos
Prakruthi Karuna
Quanyan Zhu
R. R. Hoffman
R. Watro
Rachael Flores
Rachel Alter
Rada Mihalcea
Raef Meeuwisse
Rajesh Ganesan
Robert Abbott
Robert Chesney
Robert Gutzwiller
Rogers, Andrew
Roman V. Yampolskiy
S. Jha
S. M. Ali Eslami
S. M. Assad
Sample, Char
Sarah Cooney
Sarah Garcia
Sawyer, Benjamin D
Schaefer, Kristin E.
Schlenker, Aaron
Schmorrow, Dylan D.
Shannon Vavra
Shari Lawrence Pfleegera
Sherali Zeadally
Sierhuis, Maarten
Simon Duque Anton
Siwei Lyu
Song, Dawn
Staheli, Diane
Steven Brill
Steven Templeton
Strater, Laura
Sugrim, Shridat
Sunny Fugate
Sushil Jajodia
Swarup, Vipin
T. B. Shade
T. Bourlai
Tadda, George
Tambe, Milind
Tanmoy Chakraborty
Tao Zhang
Temmie Shade
Thakoor, Omkar
Thanh H. Nguyen
Tim Hwang
Tom Warren
Tonay Flattum-Riemers
Tony Cole
Tran-Thanh, Long
V. K. Devabhaktuni
V. S. Subrahmanian
van Riemsdijk, M. Birna
Varun Haran
Vasco Amaral
Vayanos, Phebe
Veksler, Vladislav D
Vince Urias
Vorobeychik, Yevgeniy
Walt Tirenin
Wang, Cliff
Warren Perils
Will Stout
Woods, David D
Xiaosong, Zhang
Xu, Haifeng
Y. Cao
Y. Ye
Yen, John
Yuankun Xue
Z. Abaid
Z. Lu
Zeljka Zorz
Book
Magazine Article
Journal Article
Web Article
Conference Paper
Newspaper Article
Report
Presentation
Miscellaneous
Book Chapter
C3E - Articles for Review
C3E - Articles of Interest
C3E - C3E 2019
C3E - Cognitive Security
C3E - Context
C3E - Extraction
C3E - Human Machine Teaming
C3E - Interactions
C3E - Theory of Minds
C3E - Track Materials
Keywords - ACT-R
Keywords - Ad Fraud
Keywords - adaptive cyber defense techniques
Keywords - adaptive defensive cyber deception
Keywords - adaptive face-recognition system
Keywords - adversarial biometric recognition
Keywords - adversarial evasion attacks
Keywords - Adversarial Machine Learning
Keywords - adversarial mind manipulation
Keywords - AI
Keywords - Alex Endert
Keywords - Algorithm
Keywords - Alternate Reality
Keywords - ambiguous warfare
Keywords - Analytical models
Keywords - analytical reasoning
Keywords - Android malware
Keywords - android malware classifiers
Keywords - Android Malware Detection
Keywords - Android-based devices
Keywords - Androids
Keywords - Anti-Vaccine
Keywords - application program interfaces
Keywords - architectural framework
Keywords - Articles for Review
Keywords - Articles of Interest
Keywords - Artificial Intelligence
Keywords - Association
Keywords - attack surface minimization
Keywords - attacked network
Keywords - automated
Keywords - automation
Keywords - automation components
Keywords - autonomous system
Keywords - autonomous systems
Keywords - Behavioral science
Keywords - behavioral simulations
Keywords - benchmark HMT
Keywords - benchmark human-machine teams
Keywords - Benchmark testing
Keywords - Benchmarking
Keywords - Biases
Keywords - biometric recognition systems
Keywords - biometric security
Keywords - biometric system security
Keywords - biometric systems
Keywords - biometrics (access control)
Keywords - bots
Keywords - Bounded Rationality
Keywords - C3E 2019
Keywords - Causal
Keywords - classifier retraining technique
Keywords - cloud services
Keywords - coactive design
Keywords - cognition
Keywords - Cognitive Architecture
Keywords - cognitive biases
Keywords - cognitive modeling
Keywords - cognitive models
Keywords - Cognitive Security
Keywords - Cognitive Security in Cyber
Keywords - Cogntive Security
Keywords - collaboration
Keywords - Communication networks
Keywords - Comodo cloud security center
Keywords - complex data propagation network
Keywords - complex systems engineering
Keywords - Computation
Keywords - Computational modeling
Keywords - computer architecture
Keywords - Computer graphics
Keywords - Computer hacking
Keywords - computer network security
Keywords - computer security
Keywords - Computer simulation
Keywords - Context
Keywords - context awareness
Keywords - Context modeling
Keywords - convolution
Keywords - counterintelligence
Keywords - CPS Technologies
Keywords - critical network functions
Keywords - crowdsourcing
Keywords - cryptoanalysis
Keywords - Cryptography
Keywords - cyber attack
Keywords - cyber attack and defense
Keywords - cyber attackers
Keywords - cyber deception
Keywords - cyber defense
Keywords - cyber defense situational awareness
Keywords - cyber friendly fire
Keywords - cyber security
Keywords - cyber security analysis
Keywords - cyber security exposure
Keywords - cyber situation awareness
Keywords - cyber theft
Keywords - cyber weaponry
Keywords - Cyber-Decoys
Keywords - Cyber-security
Keywords - Cybercrime
Keywords - Cybersecurity
Keywords - Cyberspace
Keywords - Dagger framework
Keywords - data analysis
Keywords - data lineage
Keywords - Data mining
Keywords - Data models
Keywords - data privacy
Keywords - Data Security
Keywords - data visualisation
Keywords - Data visualization
Keywords - Dayton
Keywords - deception
Keywords - deception attack detection
Keywords - Deception Games
Keywords - Deception Technology
Keywords - Decision Making
Keywords - decision making process
Keywords - decision-making
Keywords - Deep Fakes
Keywords - Deepfakes
Keywords - defense
Keywords - delay
Keywords - digital ad fraud
Keywords - Digital Watermarks
Keywords - dimensional
Keywords - Displays
Keywords - Dynamic decision making
Keywords - dynamic function allocation
Keywords - dynamic proactive defenses
Keywords - El Paso
Keywords - Electric breakdown
Keywords - embedded cognition
Keywords - Entropy
Keywords - ergonomics
Keywords - EU elections
Keywords - Evasion Attack and Defense
Keywords - evasion attack model
Keywords - evasion cost
Keywords - EvnAttack
Keywords - Extraction
Keywords - Extremism
Keywords - face spoofing attack
Keywords - Facebook
Keywords - Fake Businesses
Keywords - fake news
Keywords - feature extraction
Keywords - feature manipulations
Keywords - feature modeling
Keywords - Feature Selection
Keywords - FireEye
Keywords - FORGE
Keywords - Forgetting System
Keywords - forgetting systems
Keywords - game theory
Keywords - Generators
Keywords - Google
Keywords - Government
Keywords - Graphics
Keywords - hacker psychology
Keywords - hackers
Keywords - Hacking
Keywords - HMT
Keywords - HMT-Context
Keywords - Human Behavior in Cyber
Keywords - human computer interaction
Keywords - Human Decision Making
Keywords - Human Factors
Keywords - Human Machine Teaming
Keywords - Human nature
Keywords - human subject experiments
Keywords - human-agent activity
Keywords - human-agent-robot teamwork
Keywords - human-centered computing
Keywords - Human-computer interaction
Keywords - human-in-the-loop system design
Keywords - human-machine teaming
Keywords - human-machine teaming (HMT)
Keywords - human-machine teaming; human-machine teams; architectural framework; dynamic function allocation; intent inferencing; machine learning
Keywords - human-machine teams
Keywords - human-robot interaction
Keywords - Humanoid robots
Keywords - Humans
Keywords - hybrid warfare
Keywords - Hypothesis testing
Keywords - image recognition
Keywords - IN-SPIRE
Keywords - influence operations
Keywords - information warfare
Keywords - innovation
Keywords - Instance-based learning
Keywords - intelligent agent
Keywords - Intelligent systems
Keywords - intent inferencing
Keywords - Interactions
Keywords - interdependence
Keywords - invasive software
Keywords - IP networks
Keywords - joint activity
Keywords - joint human-agent activity
Keywords - Knowledge extraction
Keywords - Knowledge representation
Keywords - knowledge-tracing
Keywords - learning (artificial intelligence)
Keywords - Learning systems
Keywords - learning-based classifier
Keywords - linear classifiers
Keywords - logistic regression
Keywords - machine learning
Keywords - machine learning algorithms
Keywords - machine unlearning
Keywords - machine-learning
Keywords - Malevolent Artificial Intelligence
Keywords - malicious apps
Keywords - malware
Keywords - malware detection
Keywords - Man machine systems
Keywords - Man-machine systems
Keywords - Math
Keywords - Measurement
Keywords - metadata
Keywords - metric classification
Keywords - metric identification
Keywords - Metrics
Keywords - Microsoft
Keywords - Microsoft Edge
Keywords - mimicry
Keywords - Mind
Keywords - Minimization
Keywords - mission impact assessment
Keywords - mission impact situation awareness
Keywords - MIT
Keywords - model steering functionality
Keywords - model tracing
Keywords - model-tracing
Keywords - modeling
Keywords - modeling framework
Keywords - moving target defense
Keywords - moving target defenses
Keywords - multi-agent systems
Keywords - multi-paradigm modeling
Keywords - National security
Keywords - network Contagion
Keywords - network security
Keywords - network security data context
Keywords - network simulations
Keywords - neural nets
Keywords - neural network
Keywords - nonlinear classifiers
Keywords - Ohio University
Keywords - Partial Attacker Valuation
Keywords - pattern classification
Keywords - Pattern recognition
Keywords - PE files
Keywords - Performance Metrics
Keywords - Politcs
Keywords - Political Campaigns
Keywords - politics
Keywords - portable executable files
Keywords - primitive systems
Keywords - privacy risks
Keywords - proactive cyber defense
Keywords - proactive strategies
Keywords - probability statistics
Keywords - Quantification
Keywords - Quantum random number generator
Keywords - Random Forest
Keywords - recommendation engine
Keywords - recommender systems
Keywords - red teamers
Keywords - regression analysis
Keywords - Resilient Systems
Keywords - resource management
Keywords - robotics
Keywords - robots
Keywords - Scams
Keywords - Science of Security
Keywords - SecDefender
Keywords - secure-learning paradigm
Keywords - security
Keywords - Security games
Keywords - security of data
Keywords - security perspective
Keywords - security regularization term
Keywords - semantic interaction
Keywords - Semantics
Keywords - Signal processing algorithms
Keywords - signaling scheme
Keywords - simulations
Keywords - situational awareness
Keywords - smart phones
Keywords - smart technology
Keywords - Social Behavior
Keywords - social media
Keywords - Stackelberg Security Game
Keywords - statistical analysis
Keywords - statistical query learning
Keywords - Strategic Signaling
Keywords - summation form
Keywords - Support vector machines
Keywords - Surface treatment
Keywords - SVM
Keywords - Systems engineering and theory
Keywords - Task Analysis
Keywords - team player
Keywords - team working
Keywords - Teamwork
Keywords - Technology management
Keywords - threat assessment
Keywords - timeliness violations
Keywords - Training
Keywords - Training data
Keywords - training effectiveness
Keywords - Twitter
Keywords - twitter bots
Keywords - unethical research
Keywords - usability perspective
Keywords - user analytic process
Keywords - user devices
Keywords - user evaluation
Keywords - user interaction methodology
Keywords - visual analytics
Keywords - visualization
Keywords - visualization framework
Keywords - voting protocol mechanisms
Keywords - Water purification plant
Keywords - Windows API calls
Keywords - Windows application programming interface calls
Keywords - Winter Olympics
Keywords - YouTube
Topics - CPS Technologies
Topics - Science of Security
2019
2018
2017
2016
2015
2014
2013
2012
2010
2004
2003
ACT-R
Ad Fraud
adaptive cyber defense techniques
adaptive defensive cyber deception
adaptive face-recognition system
adversarial biometric recognition
adversarial evasion attacks
Adversarial Machine Learning
adversarial mind manipulation
AI
Alex Endert
Algorithm
Alternate Reality
ambiguous warfare
Analytical models
analytical reasoning
Android malware
android malware classifiers
Android Malware Detection
Android-based devices
Androids
Anti-Vaccine
application program interfaces
architectural framework
Articles for Review
Articles of Interest
artificial intelligence
Association
attack surface minimization
attacked network
Automated
Automation
automation components
autonomous system
autonomous systems
Behavioral science
behavioral simulations
benchmark HMT
benchmark human-machine teams
Benchmark testing
Benchmarking
Biases
biometric recognition systems
biometric security
biometric system security
biometric systems
biometrics (access control)
bots
Bounded Rationality
C3E 2019
Causal
classifier retraining technique
cloud services
coactive design
Cognition
cognitive architecture
Cognitive Biases
cognitive modeling
cognitive models
Cognitive Security
Cognitive Security in Cyber
Cogntive Security
Collaboration
Communication networks
Comodo cloud security center
complex data propagation network
complex systems engineering
computation
Computational modeling
Computer architecture
Computer graphics
Computer hacking
computer network security
computer security
Computer simulation
Context
context awareness
Context modeling
convolution
counterintelligence
CPS Technologies
critical network functions
crowdsourcing
cryptoanalysis
cryptography
cyber attack
cyber attack and defense
cyber attackers
cyber deception
cyber defense
cyber defense situational awareness
cyber friendly fire
cyber security
cyber security analysis
cyber security exposure
cyber situation awareness
cyber theft
cyber weaponry
Cyber-Decoys
cyber-security
Cybercrime
cybersecurity
Cyberspace
Dagger framework
Data analysis
data lineage
data mining
Data models
data privacy
Data security
data visualisation
Data visualization
Dayton
deception
deception attack detection
Deception Games
Deception Technology
decision making
decision making process
decision-making
Deep Fakes
Deepfakes
defense
delay
digital ad fraud
Digital Watermarks
dimensional
Displays
Dynamic decision making
dynamic function allocation
dynamic proactive defenses
El Paso
Electric breakdown
embedded cognition
Entropy
ergonomics
EU elections
Evasion Attack and Defense
evasion attack model
evasion cost
EvnAttack
Extraction
Extremism
face spoofing attack
Facebook
Fake Businesses
fake news
feature extraction
feature manipulations
feature modeling
feature selection
FireEye
FORGE
Forgetting System
forgetting systems
game theory
Generators
Google
Government
Graphics
hacker psychology
hackers
Hacking
HMT
HMT-Context
Human Behavior in Cyber
human computer interaction
Human Decision Making
human factors
Human Machine Teaming
Human nature
human subject experiments
human-agent activity
human-agent-robot teamwork
human-centered computing
human-computer interaction
human-in-the-loop system design
human-machine teaming
human-machine teaming (HMT)
human-machine teaming; human-machine teams; architectural framework; dynamic function allocation; intent inferencing; machine learning
human-machine teams
human-robot interaction
Humanoid robots
Humans
hybrid warfare
hypothesis testing
image recognition
IN-SPIRE
influence operations
information warfare
Innovation
Instance-based learning
intelligent agent
Intelligent systems
intent inferencing
Interactions
interdependence
invasive software
IP networks
joint activity
joint human-agent activity
Knowledge extraction
knowledge representation
knowledge-tracing
learning (artificial intelligence)
Learning systems
learning-based classifier
linear classifiers
logistic regression
machine learning
machine learning algorithms
machine unlearning
machine-learning
Malevolent Artificial Intelligence
malicious apps
Malware
malware detection
Man machine systems
Man-machine systems
Math
Measurement
metadata
metric classification
metric identification
Metrics
Microsoft
Microsoft Edge
mimicry
Mind
Minimization
mission impact assessment
mission impact situation awareness
MIT
model steering functionality
model tracing
model-tracing
Modeling
Modeling Framework
moving target defense
moving target defenses
multi-agent systems
multi-paradigm modeling
National security
network Contagion
Network security
network security data context
network simulations
neural nets
Neural Network
nonlinear classifiers
Ohio University
Partial Attacker Valuation
pattern classification
Pattern recognition
PE files
Performance Metrics
Politcs
Political Campaigns
politics
portable executable files
primitive systems
privacy risks
proactive cyber defense
proactive strategies
probability statistics
quantification
Quantum random number generator
Random Forest
recommendation engine
recommender systems
red teamers
regression analysis
Resilient Systems
Resource management
Robotics
robots
Scams
science of security
SecDefender
secure-learning paradigm
security
security games
security of data
security perspective
security regularization term
semantic interaction
Semantics
Signal processing algorithms
signaling scheme
simulations
situational awareness
smart phones
Smart technology
Social Behavior
social media
Stackelberg Security Game
statistical analysis
statistical query learning
Strategic Signaling
summation form
Support vector machines
Surface treatment
SVM
Systems engineering and theory
Task Analysis
team player
team working
Teamwork
Technology management
Theory of Minds
Threat Assessment
timeliness violations
Track Materials
Training
Training data
training effectiveness
Twitter
twitter bots
unethical research
usability perspective
user analytic process
user devices
user evaluation
user interaction methodology
visual analytics
visualization
visualization framework
voting protocol mechanisms
Water purification plant
Windows API calls
Windows application programming interface calls
Winter Olympics
YouTube