Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Context modeling
biblio
An Empathetic Conversational Agent with Attentional Mechanism
Submitted by aekwall on Fri, 08/26/2022 - 11:03am
Computational modeling
social networking (online)
pubcrawl
Scalability
Metrics
Human behavior
Informatics
conversational agents
Context modeling
attention mechanism
depression
empathetic conversational agent
machine translation
mental health
sequence-to-sequence model
biblio
Supporting the Engineering of Multi-Fidelity Simulation Units With Simulation Goals
Submitted by grigby1 on Wed, 04/20/2022 - 8:50am
Model-Based System Engineering
Systems engineering and theory
Stakeholders
simulation
Resiliency
resilience
pubcrawl
Model fidelity
Model driven engineering
collaboration
model
Metrics
CPS Simulation
CPS modeling
Context modeling
composability
Complexity theory
biblio
A Context-Policy-Based Approach to Access Control for Healthcare Data Protection
Submitted by grigby1 on Mon, 11/29/2021 - 1:49pm
Medical services
Tamper-Resistance
Tamper resistance
Sensor Systems
sensors
Scalability
pubcrawl
Protocols
Metrics
Access Control
Identification
Human Factors
Human behavior
Context modeling
computer security
authorization
authentication
biblio
Contextual Privacy Policy Modeling in IoT
Submitted by grigby1 on Tue, 10/12/2021 - 1:53pm
IoT Privacy Taxonomy
taxonomy
smart buildings
Scalability
pubcrawl
Privacy Policy
Privacy Policies
Privacy Formalization
privacy
Context
IoT
Internet of Things
Intelligent sensors
Human behavior
data privacy
Cyberspace
cyber-physical systems
Context modeling
biblio
Short Text Intent Classification for Conversational Agents
Submitted by aekwall on Tue, 09/07/2021 - 10:16am
Distance measurement
Small Datasets
sentiment analysis
random forests
Product design
Pipelines
opinion mining
medical treatment
Language Understanding
Health
machine learning
Discourse
Context modeling
conversational agents
chatbot
Human behavior
Metrics
Scalability
pubcrawl
biblio
Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication
Submitted by grigby1 on Tue, 08/17/2021 - 3:18pm
Anomaly Detection
authentication
behavioural biometrics
Context modeling
Contextual Authentication
Data models
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Mathematical model
Metrics
password
pubcrawl
Urban areas
user authentication
biblio
Dynamic vs Static Encryption Tables in DES Key Schedules
Submitted by grigby1 on Thu, 05/20/2021 - 10:54am
encryption
Schedules
Adaptation models
pubcrawl
Metrics
resilience
Resiliency
Mathematical model
Cryptography
composability
Memory management
Dynamic scheduling
Context modeling
DES
Key schedule
white box cryptography
biblio
The Model of Big Data Cloud Computing Based on Extended Subjective Logic
Submitted by grigby1 on Tue, 04/27/2021 - 1:46pm
authentication
authentication technology
Big Data
big data security in the cloud
big data service
cloud
Cloud Computing
Computational modeling
Context modeling
Data models
pubcrawl
security
subjective logic
biblio
The EGRBAC Model for Smart Home IoT
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
home automation
smart houses
smart home IoT
extended generalized role based access control model
EGRBAC model
AWS-IoT Greengrass
RBAC
Information Reuse and Security
Context modeling
Compositionality
authorisation
Smart homes
Computational modeling
pubcrawl
Resiliency
Adaptation models
smart devices
Internet of Things
Access Control
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
1
2
3
4
next ›
last »