Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
psychology
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by
aekwall
on Mon, 12/09/2019 - 11:23am
security of data
Trusted Computing
pubcrawl
composability
graph theory
Computational modeling
Metrics
Vulnerability
systems engineering
trust
Measurement
Trust management
evaluation
Risk
modeling
psychology
cognition
Compositionality
complex intersystem trust relationships
complex multitiered system architectures
Component architectures
disparate system
engineering trust
graph-based algorithm
graph-based modeling methodology
requirements analysis
System Engineering
Systems architecture
systems engineering processes
trust modeling
Computing Theory and Trust
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by
grigby1
on Mon, 09/09/2019 - 9:56am
ART
Compositionality
Cryptographic Protocols
Internet Protocol Security (IPsec)
IPsec
key administration
Learning management systems
Loading
MANET
MANET security
Metrics
mobile ad hoc networks
mobile circumstantial network
Mobile handsets
policy-based network administration
Pragmatics
psychology
pubcrawl
QoS
quality of service
quality of service (QoS)
resilience
Resiliency
routing protocol design
Routing protocols
telecommunication security
trust-based performance evaluation
usability
biblio
A Social Engineer in Terms of Control Theory
Submitted by
grigby1
on Thu, 09/05/2019 - 10:27am
communication algorithms
communication control system
communication process
composability
contracts
Control Theory
effective communication
Handheld computers
human factor
human model
information security
information security specialists
nonstochastic communication object
password
Planning
psychology
pubcrawl
resilience
Resiliency
security
security of data
social engineer
social engineering
telecommunication control
terminal model
tools
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by
aekwall
on Wed, 05/08/2019 - 8:47am
authorisation
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
Engagement
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
Monitoring
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
positive incentives
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
biblio
Towards a data-driven behavioral approach to prediction of insider-threat
Submitted by
aekwall
on Wed, 05/08/2019 - 8:47am
Atmospheric measurements
behavioral analysis
data-driven behavioral approach
Game-based Approach
Games
Human behavior
industrial property
insider threat
Insider Threat Detection
Insider Threats
insider-threat related behavior
learning (artificial intelligence)
Linguistics
Metrics
Organizations
Particle measurements
personality differences
personality variables
personality vulnerabilities
post-hoc personality analysis
psychology
pubcrawl
resilience
security of data
Task Analysis
biblio
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
Submitted by
grigby1
on Fri, 02/22/2019 - 3:02pm
Adversarial Authorship
authorship attribution
computer science
feature extraction
Feature Selection
GEFeS
Human behavior
LIWC
Metrics
psychology
pubcrawl
Semantics
sentiment analysis
Steady-state
Steady-State Genetic Algorithm
stylometry
Writing
biblio
Dynamic Psychological Game for Adversarial Internet of Battlefield Things Systems
Submitted by
grigby1
on Mon, 12/10/2018 - 10:34am
adversarial Internet of Battlefield Things systems
BER
Bit error rate
desired bit error rate performance
dynamic network interdiction game
dynamic psychological game
error statistics
game theory
Games
Human Factors
Internet of battlefield things
Internet of Things
iobt
military communication
novel game-theoretic framework
optimal IoBT devices
performance evaluation
psychological behavior
psychological forward induction-based solution
psychological game theory
psychological network interdiction game
psychological sequential equilibrium
psychology
pubcrawl
resilience
Resiliency
Scalability
security
Signal to noise ratio
traditional dynamic Bayesian game
biblio
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Submitted by
K_Hooper
on Wed, 02/14/2018 - 11:02am
trust statements
Trusted Computing
stars interface
Reliability engineering
Radar
pubcrawl
psychology
human trust
human computer interaction
Human-computer interaction
Human behavior
Decision Making
data visualisation
Color
Trust visualisation
trust visualisations
T-Viz
user study
visualization
biblio
Measuring Personality for Automatic Elicitation of Privacy Preferences
Submitted by
grigby1
on Tue, 02/06/2018 - 12:43pm
big data privacy
Big-Five personality traits
computer science
cultural differences
Data collection
data privacy
Electronic mail
Human Factors
intelligent privacy management systems
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
personality trait
Policy
privacy
privacy preference
privacy protection
psychology
pubcrawl
Resiliency
Scalability
user connectivity
user personality traits
user privacy preferences
web applications
biblio
Accounting for the Human User in Predictive Security Models
Submitted by
grigby1
on Thu, 12/28/2017 - 12:30pm
accounting
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
General Deterrence Theory
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
Predictive Metrics
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
security breaches
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
1
2
3
next ›
last »