Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cognition
biblio
A Decentralized Approach to Explanatory Artificial Intelligence for Autonomic Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
Scalability
Runtime
cyber-physical systems
Resiliency
pubcrawl
fault tolerant computing
cognition
Smart homes
home automation
Smart Home
Artificial Intelligence
Power demand
smart home domain
xai
Autonomic systems
user trust
Autonomic Management
autonomic management system
black box methods
D-CAN
Decentralised Architecture
explanation
explanatory AI
explanatory artificial intelligence
generic decentralized architecture
SISSY systems
XAI functions
XAI solution
biblio
XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:00pm
Scalability
real-time systems
Resiliency
pubcrawl
fuzzy set theory
software tools
cognition
complex systems
Artificial Intelligence
cognitive systems
FCM
xai
Optimized production technology
Fuzzy cognitive maps
computing with words
Dynamic SWOT analysis
explainable artificial intelligence
explanation
Fuzzy SWOT Maps
fuzzy SWOT maps network structure
software tool
SWOT analyses
SWOT+CWW network
XAI-Based system analysis
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 12:42pm
pubcrawl
resilience
Resiliency
telecommunication security
sensor fusion
Artificial Intelligence
cognition
Cost accounting
inference mechanisms
probability
uncertainty
threat assessment
marine communication
Sensitivity
underwater acoustic communication
uncertainty handling
Damage Assessment
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
information fusion
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
biblio
Learning in Motion: Dynamic Interactions for Increased Trust in Human-Robot Interaction Games
Submitted by grigby1 on Wed, 02/03/2021 - 12:42pm
cognition
cognitive science literature
computer games
dance motion
dynamic interactions
embodied cognition
Human behavior
Human Factors
human perspective
human-robot interaction
human-robot interaction games trust
human-robot interactions
humanoid robot
Humanoid robots
pubcrawl
resilience
Resiliency
Robot Trust
social empathy
biblio
Measuring Human Trust in a Virtual Assistant using Physiological Sensing in Virtual Reality
Submitted by aekwall on Mon, 02/01/2021 - 10:38am
smart devices
Task Analysis
Human behavior
pubcrawl
Shape
Games
human computer interaction
cognition
Human Factors
user interfaces
interactive systems
virtual reality
psychology
virtual agents
physiology
medical signal processing
electroencephalography
artificial intelligence technology
eeg
human trust
and virtual realities
auditory assistance
augmented
cognitive load
custom VR environment
galvanic skin response
H.1.2 [User/Machine Systems]: Human factors
H.5.1 [Information Interfaces and Presentation]: Multimedia Information Systems— Artificial
H.5.2 [User Interfaces]: Evaluation/methodology
heart rate variability
heart-rate variability
human trust formation
physiological sensing
physiological sensor data
Skin
subjective mental effort questionnaire
Virtual Assistant
virtual reality based search task
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
Scalability
Ontologies
Task Analysis
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
ontologies (artificial intelligence)
cryptocurrencies
fuzzy set theory
smart contracts
contracts
cognition
Semantics
inference mechanisms
Ethereum blockchain
fuzzy reasoning
blockchain systems
Pareto optimisation
best satisfiability degree
blockchain smart contracts
fuzzy ontologies
fuzzy ontology reasoning task
Fuzzy sets
Pareto-optimal solutions
partial agreement
Fuzzy Cryptography
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
Scalability
data privacy
programming
Resiliency
Human behavior
pubcrawl
composability
privacy
tools
Databases
cognition
differential privacy
programming languages
data analysis
reasoning
Accuracy
functional programming
accuracy concentration
concentration bounds
data analyses results
Haskell
private data analyses
programming differentially private analyses
biblio
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
Submitted by grigby1 on Mon, 12/28/2020 - 11:49am
adaptive filtering
Binary Relevance
cognition
Ensemble
feature extraction
FLD
Gabor filters
information security
Labeling
Metrics
Model-Selection
pubcrawl
resilience
Resiliency
Scalability
steganalysis
Task Analysis
Training
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
security of data
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
mobile radio
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
abnormal nodes
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
log entries
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
capture the flag
cognition
cognitive testing
Computer bugs
Computer crime
computer security
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
controlled human-subject experiment
cyber deception experiment
cyber testing
Data collection
deeply rooted human component
experimental controls
future cyber operations studies
human attacker
Human behavior
Human Behavior and Cybersecurity
Human Factors
human performance
military computing
psychology
pubcrawl
red team
Task Analysis
traditional CTF events
1
2
3
4
5
6
next ›
last »