Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
deception
biblio
Trust and Deception in Hypergame Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:40pm
game theory
deception
pubcrawl
composability
Computational modeling
Decision Making
Mathematical model
Games
Temporal Logic
sensors
Compositionality
Atmospheric modeling
formal model
attacker-defender hypergame
conflict
hypergame theoretic framework
hypergame theory
misperception
model decision
temporal hypergame model
Computer Theory and Trust
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
Cloud Computing
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
obfuscation
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
big data privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
New Paradigms for Privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
biblio
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
Submitted by grigby1 on Mon, 01/27/2020 - 11:29am
author identification
deanonymization
deception
Human behavior
Human Factors
Metrics
pubcrawl
stylometry
text obfuscation
biblio
Online Deception in Social Media
Submitted by willirn1 on Thu, 09/26/2019 - 2:41pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
Demystifying Deception Technology: A Survey
Submitted by willirn1 on Thu, 09/26/2019 - 2:37pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
Tricking attackers through the art of deception
Submitted by willirn1 on Thu, 09/26/2019 - 2:32pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
Deception Technology: A Primer
Submitted by willirn1 on Thu, 09/26/2019 - 2:30pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
Deception Technology—Useful Tool or Just More Busywork?
Submitted by willirn1 on Thu, 09/26/2019 - 2:27pm
Cognitive Security in Cyber
Cognitive Security
deception
Deception Technology
biblio
Misleading Cyber Foes with Deception Technology
Submitted by willirn1 on Thu, 09/26/2019 - 2:25pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
How Deception Technology Helps CISOs Meet the Challenges of Cyber security
Submitted by willirn1 on Thu, 09/26/2019 - 2:23pm
Cognitive Security in Cyber
Cognitive Security
deception
Deception Technology
1
2
3
4
5
next ›
last »