Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Registration
Program Agenda
Suggested Reading
Venue / Travel
Challenge Problems
Workshop Archives
Files
CPS-VO
»
Computational Cybersecurity in Compromised Environments (C3E)
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Anon
A. Endert
A. Y. Javaid
Aaron Jones
Abdul Rahman
Adam Stone
Adrienne Raglin
Aggarwal, Palvi
Ahad, Ijaz
Alex Holbrook
Alexander Nelson
Allan Friedman
Amelia Acker
Amelkin, Victor
Ana Moreira
Andrew Alvarado-Seig
Andrew Bushby
Andrew K.
Andrew Rogers
Andy Greenberg
Angela Combs
Angela Smith
Anthony Macera
Antonio Picariello
Apostolakis, Sotiris
Ash Richter
Ashley Reichert
August, David I.
Austin Whipple
B. Biggio
B. Flatley
B. Simidchieva
Barbara Guttman
Barford, Paul
Beard, Stephen R.
Benjamin Sawyer
Benjamin, Perakath
Bentz Tozer
Bjarnadottir, Margret
Bradshaw, Jeffrey M
Bradshaw, Jeffrey M.
Buchler, Norbou
C. Wang
Caleb Loverro
Caleb Townsend
Cammarota, Rosario
Carol Woody
Caroline O'Leary
Carolyn Crandall
Casey Newton
Cassenti, Daniel N
Celia Paulsen
Chang, Yanling
Chen, Lin
Chen, Wen
Chiyuan Zhang
Chris Bing
Chris Bonnette
Christian Lebiere
Christoph Lipps
Christopher Kiekintveld
Christopher Pashley
Chung, Wingyan
Cleotilde Gonzalez
Clifford Riggs
Clint Watts
Cranford, Edward A
Cristiano De Faveri
Cynthia O. Dominguez
D. D. Woods
D. Last
D. Myers
D. S. LaFon
Dacier, Marc
Dan Geer
Dan Woods
Daniel Fraunholz
Daniel Krohmer
Daniel Reti
Dave Bernard
Dave Climek
David Meier
David Rand
David Sasaki
Deanna Caputo
Derek Johnson
Devin Coldewey
Dietterich, Thomas G.
Don Norman
Dorje Brody
Doron Kolton
Drew Robb
E. Peterson
Edward A. Cranford
Edward Amoroso
Ellen Laderman
Erbacher, Robert F.
F. Roli
F. Yaman
Fang, Fei
Farooq, Muhammad Junaid
Federico Pistono
Feltovich, Paul J.
Ferguson-Walter, Kimberly
Fernandes, Ronald
Fidopiastis, Cali M.
Filippo Menczer
Fix, Jordan
Forte, Domenic
Frank Perbet
Frank Stech
Frederic Pohl
Fredrikson, Matt
Fugate, Sunny
g. fumera
G. Klien
Gao, Zhimin
Genevieve Shannon
George Guttman
George Hulme
Ghosh, Soumyadeep
Giancarlo Sperli
Giffin, Jon
Gloria Serrao
Gomez, Steven R.
Gonzalez, Cleotilde
Gordon Grovitz
Gordon Pennycook
Gourisetti, Sri Nikhil Gupta
Grayson Walters
Gregory Barber
Gutzwiller, Robert
Gutzwiller, Robert S
H. Francis Song
Haifeng Xu
Hancock, PA
Hannah Lensing
Hans Dieter Schotten
Hart Rossman
Hazari, Noor Ahmad
Hemant Purohit
Herbert Lin
Hilt, Michael
Hoffman, Blaine E
Hoffman, Robert R
Hubert Bowditch
Hunt, Aaron
Hwang, Jong
Iakovou, Eleftherios
Ian Bogost
Incerti, Taynara
Isabel M. Trahan
J. J. Gallimore
J. Loyall
J. M. Bradshaw
J. Y. Haw
J. Yang
Jaclynn Kerr
Jade Freeman
Jajodia, Sushil
James Gimbi
James Sanders
Jason Carnes
Jeff Brewer
Jeff Grabmeier
Jeff Huegel
Jeff Stewart
Jeff Stone
Jeffrey Ng
Jenifer Clark
Jessica Barber
Jha, Somesh
Jill Dougherty
Joe Bradley
John Ryan
John Speed Meyers
Johnson, Matthew
Jon Boyens
Jon M. Boyens
Jonathan Katz
Jonker, Catholijn M.
Justin Mauger
Karl Levitt
Karri, Ramesh
Katie Arrington
Kaveh Waddell
Kay M.
Kay Mereish
Kelly Sheridan
Kelly Shortridge
Ken Mai
Kevin Nauer
Khan, Riaz Ullah
Khan, Saad
Kieras, Timothy
Kimberley Sanders
Kimberly Ferguson-Walter
Kizito, Rodney
Kott, Alexander
Kris Winkler
Kristie Pfosi
Kristin Divis
Kristin Heckman
Kulkarni, Akshay
Kumar, Jay
Kumar, Rajesh
L. Chen
L. Didaci
Lai, Vincent S. K.
Laurence Pitt
Lebiere, Christian
Lee Foster
Lerch, Javier F
Li, Biyan
Li, Jason
Li, Xueping
Lily Hay Newman
Lily Kuo
Linda Musthaler
Lisa VanSlyke
Liu, Gregory
Liu, Jinwei
Liu, Peng
Lucas Ropek
M Mitchell Waldrop
M. A. Kaafar
M. Atighetchi
M. Carvalho
Madni, Azad
Madni, Carla
Mancuso, Vincent
Marcus Gutierrez
Maria Korolov
Maria Temming
Mario Ayala
Mark Heckman
Mark Rockwell
Mark Sherman
Matt Bishop
Matthew Botvinick
Matthew Butkovic
Matthew Dorin
Matthew Fallon
Matthew H. Ryan
Matthew Scholl
Matthew Stamm
Matthias Tammen
Maxine Major
Mayra Rosario Fuentes
Mengistu, Zelalem
Michael Cohen
Michael Trumbo
Michail Tsikerdekis
Michalina M.
Michelle Danks
Mikaela Ashburn
Mike Elgan
Mikko Laitinen
Milen Zerabruk
Milind Tambe
Moh Kilani
Mohammad Sujan Miah
Mohan Gopalakrishnan
Monique Mansoura
Mylrea, Michael
N. D. Truong
N. Soule
Nadya Bartol
Nagendra, Nayana P.
Nasir Memon
Nathan L.
Nathaniel Gleicher
Neil C. Rabinowitz
Nguyen, Phuong
Niamat, Mohammed
Nicholas Kasdaglis
Nicole Lee
Ning, Peng
Niten Malik
Nuangpookka, Pipop
Numaan Huq
O. Kavehei
Oh, Taewook
Omkar Thakoor
Oscar Veliz
Ou, Xinming
P. Damacharla
P. J. Feltovich
P. K. Lam
P. Russu
Paresh Dave
Paris Martineau
Parkinson, Simon
Patel, Mayank
Patricia L. McDermott
Paul Black
Paul Bogdan
Pawel Korus
Peter Champion
Peter Dizikes
Phebe Vayanos
Prakruthi Karuna
Quanyan Zhu
R. R. Hoffman
R. Watro
Rachael Flores
Rachel Alter
Rachel Bruenjes
Rada Mihalcea
Raef Meeuwisse
Rahman, Fahim
Rajesh Ganesan
Rama Moorthy
Raschid, Louiqa
Ray, Sandip
Raymond Richards
Richard Holder
Rob Cantu
Robert Abbott
Robert Chesney
Robert Gutzwiller
Rogers, Andrew
Roman V. Yampolskiy
Ryne Graf
S. Jha
S. M. Ali Eslami
S. M. Assad
Sample, Char
Sandor Boyson
Sarah Cooney
Sarah Garcia
Sawyer, Benjamin D
Schaefer, Kristin E.
Schlenker, Aaron
Schmorrow, Dylan D.
Shahriar, Hossain
Shakya, Bicky
Shannon Vavra
Shao, Daniel
Shari Lawrence Pfleegera
Shelby S. Oakley
Sherali Zeadally
Shi, Weidong
Sierhuis, Maarten
Simon Duque Anton
Sinclair, Dara
Siwei Lyu
Song, Dawn
Staheli, Diane
Stephenson, Andrew
Steven Brill
Steven Templeton
Strater, Laura
Sugrim, Shridat
Sunny Fugate
Sushil Jajodia
Swarup, Vipin
T. B. Shade
T. Bourlai
Tadda, George
Tambe, Milind
Tan, Benjamin
Tang, Xinlin
Tanmoy Chakraborty
Tao Zhang
Tehranipoor, Mark
Temmie Shade
Thakoor, Omkar
Thanh H. Nguyen
Thomas Choi
Thomas Corsi
Thomas Proctor
Thomas Wills
Tim Hwang
Tim Leaf
Tom Warren
Tonay Flattum-Riemers
Tony Cole
Tran-Thanh, Long
V. K. Devabhaktuni
V. S. Subrahmanian
Vadim Okun
van Riemsdijk, M. Birna
Varun Haran
Vasco Amaral
Vassilev, Apostol
Vayanos, Phebe
Veksler, Vladislav D
Victor Benjamin
Vince Urias
Vohra, Rakesh
Vorobeychik, Yevgeniy
Walt Tirenin
Wang, Cliff
Warren Perils
Will Stout
William Claycomb
William Heinbockel
Woods, David D
Xiaosong, Zhang
Xu, Haifeng
Xu, Lei
Xu, Xiaolin
Y. Cao
Y. Ye
Yang, Baijian
Yen, John
Yuankun Xue
Z. Abaid
Z. Lu
Zac Rogers
Zeljka Zorz
Zhang, Chi
Zhang, Hansen
Zhu, Quanyan
Miscellaneous
Web Article
Government Report
Report
Journal Article
Conference Paper
Newspaper Article
Magazine Article
Book
Presentation
Conference Proceedings
Book Chapter
C3E - Articles for Review
C3E - Articles of Interest
C3E - C3E 2019
C3E - Cognitive Security
C3E - Context
C3E - Extraction
C3E - Human Machine Teaming
C3E - Interactions
C3E - Theory of Minds
C3E - Track Materials
Keywords - 3D printing
Keywords - acquire
Keywords - ACT-R
Keywords - Ad Fraud
Keywords - adaptability
Keywords - adaptive cyber defense techniques
Keywords - adaptive defensive cyber deception
Keywords - adaptive face-recognition system
Keywords - additive manufacturing
Keywords - advanced cyber threat
Keywords - advanced persistent threat
Keywords - adversarial biometric recognition
Keywords - adversarial evasion attacks
Keywords - Adversarial Machine Learning
Keywords - adversarial mind manipulation
Keywords - agri-food
Keywords - AI
Keywords - AI technology
Keywords - Alex Endert
Keywords - Algorithm
Keywords - Algorithms
Keywords - Alternate Reality
Keywords - ambiguous warfare
Keywords - Analytical models
Keywords - analytical reasoning
Keywords - Android malware
Keywords - android malware classifiers
Keywords - Android Malware Detection
Keywords - Android-based devices
Keywords - Androids
Keywords - Anti-Vaccine
Keywords - application program interfaces
Keywords - architectural framework
Keywords - Articles for Review
Keywords - Articles of Interest
Keywords - Artificial Intelligence
Keywords - Association
Keywords - attack surface minimization
Keywords - attacked network
Keywords - attackers
Keywords - authentication mechanisms
Keywords - automated
Keywords - automation
Keywords - automation components
Keywords - automotive cybersecurity
Keywords - automotive supply chains
Keywords - autonomous system
Keywords - autonomous systems
Keywords - Baseline criticality
Keywords - Behavioral science
Keywords - behavioral simulations
Keywords - benchmark HMT
Keywords - benchmark human-machine teams
Keywords - Benchmark testing
Keywords - Benchmarking
Keywords - best practices
Keywords - Biases
Keywords - biometric recognition systems
Keywords - biometric security
Keywords - biometric system security
Keywords - biometric systems
Keywords - biometrics (access control)
Keywords - blockchain
Keywords - bots
Keywords - Bounded Rationality
Keywords - C-SCRM
Keywords - C3E
Keywords - C3E 2019
Keywords - Call to Action
Keywords - case study
Keywords - Causal
Keywords - classifier retraining technique
Keywords - cloud & virtualization
Keywords - cloud services
Keywords - coactive design
Keywords - code review
Keywords - cognition
Keywords - Cognitive Architecture
Keywords - cognitive biases
Keywords - cognitive modeling
Keywords - cognitive models
Keywords - Cognitive Security
Keywords - Cognitive Security in Cyber
Keywords - Cogntive Security
Keywords - collaboration
Keywords - commerce
Keywords - Communication networks
Keywords - Communications technology
Keywords - Comodo cloud security center
Keywords - complex data propagation network
Keywords - complex systems engineering
Keywords - Compliance
Keywords - Comprehensive National Cybersecurity Initiative
Keywords - Compromise
Keywords - compromise resilience
Keywords - Computation
Keywords - Computational modeling
Keywords - computer architecture
Keywords - Computer graphics
Keywords - Computer hacking
Keywords - computer network security
Keywords - computer security
Keywords - Computer simulation
Keywords - Configuration Management
Keywords - congestion
Keywords - Containment
Keywords - Context
Keywords - context awareness
Keywords - Context modeling
Keywords - controls assessment
Keywords - convolution
Keywords - counterintelligence
Keywords - CPS Technologies
Keywords - critical components
Keywords - critical infrastructure
Keywords - critical network functions
Keywords - critical programs
Keywords - critical software systems
Keywords - critical systems
Keywords - criticality
Keywords - criticality analysis
Keywords - crowdsourcing
Keywords - cryptoanalysis
Keywords - Cryptography
Keywords - cyber
Keywords - cyber attack
Keywords - cyber attack and defense
Keywords - cyber attackers
Keywords - Cyber Attacks
Keywords - cyber deception
Keywords - cyber defense
Keywords - cyber defense situational awareness
Keywords - cyber friendly fire
Keywords - cyber resilience
Keywords - cyber resilience and security
Keywords - Cyber Response
Keywords - cyber risk
Keywords - cyber security
Keywords - cyber security analysis
Keywords - cyber security exposure
Keywords - cyber situation awareness
Keywords - cyber supply chain
Keywords - cyber supply chain risk management
Keywords - cyber theft
Keywords - cyber threat
Keywords - cyber threats
Keywords - cyber weaponry
Keywords - cyber-attacks
Keywords - Cyber-Decoys
Keywords - cyber-physical systems
Keywords - Cyber-SCRM
Keywords - Cyber-security
Keywords - Cyber-Supply Chain Risk Management
Keywords - Cybercrime
Keywords - Cybersecurity
Keywords - Cybersecurity Enhancement Act
Keywords - Cybersecurity Strategy and Implementation Plan
Keywords - Cyberspace
Keywords - Cyberspace Policy Review
Keywords - Dagger framework
Keywords - data
Keywords - data analysis
Keywords - data lineage
Keywords - Data mining
Keywords - Data models
Keywords - Data Oversight
Keywords - data privacy
Keywords - Data Security
Keywords - data visualisation
Keywords - Data visualization
Keywords - Dayton
Keywords - deception
Keywords - deception attack detection
Keywords - Deception Games
Keywords - Deception Technology
Keywords - Decision Making
Keywords - decision making process
Keywords - decision-making
Keywords - Deep Fakes
Keywords - Deepfakes
Keywords - defense
Keywords - delay
Keywords - Department of Defense
Keywords - design for debug
Keywords - design for test
Keywords - detection
Keywords - digital ad fraud
Keywords - digital supply chain system
Keywords - Digital Watermarks
Keywords - dimensional
Keywords - Direct Digital Manufacturing
Keywords - Displays
Keywords - distribution
Keywords - DNI
Keywords - Dynamic decision making
Keywords - dynamic function allocation
Keywords - dynamic proactive defenses
Keywords - economic espionage
Keywords - El Paso
Keywords - Electric breakdown
Keywords - electronics supply chain
Keywords - embedded cognition
Keywords - emergency services
Keywords - emergent behaviors
Keywords - emergent execution engineers
Keywords - emerging threat
Keywords - Energy
Keywords - Energy Sector
Keywords - Entropy
Keywords - equilibrium
Keywords - ergonomics
Keywords - espionage
Keywords - EU elections
Keywords - Evasion Attack and Defense
Keywords - evasion attack model
Keywords - evasion cost
Keywords - EvnAttack
Keywords - Executive Order
Keywords - Executive Order 13636
Keywords - external dependency management
Keywords - Extraction
Keywords - Extremism
Keywords - face spoofing attack
Keywords - Facebook
Keywords - Fake Businesses
Keywords - fake news
Keywords - feature extraction
Keywords - feature manipulations
Keywords - feature modeling
Keywords - Feature Selection
Keywords - FireEye
Keywords - firmware
Keywords - food security
Keywords - foreign policy
Keywords - FORGE
Keywords - Forgetting System
Keywords - forgetting systems
Keywords - formal
Keywords - fuzzing
Keywords - game theory
Keywords - Generators
Keywords - Google
Keywords - Government
Keywords - Graphics
Keywords - hacker psychology
Keywords - hackers
Keywords - Hacking
Keywords - Hardware
Keywords - Hardware Security
Keywords - Hardware Trojans
Keywords - Healthcare
Keywords - healthcare industry
Keywords - HMT
Keywords - HMT-Context
Keywords - Human Behavior in Cyber
Keywords - human computer interaction
Keywords - Human Decision Making
Keywords - Human Factors
Keywords - Human Machine Teaming
Keywords - Human nature
Keywords - human subject experiments
Keywords - human-agent activity
Keywords - human-agent-robot teamwork
Keywords - human-centered computing
Keywords - Human-computer interaction
Keywords - human-in-the-loop system design
Keywords - human-machine teaming
Keywords - human-machine teaming (HMT)
Keywords - human-machine teaming; human-machine teams; architectural framework; dynamic function allocation; intent inferencing; machine learning
Keywords - human-machine teams
Keywords - human-robot interaction
Keywords - Humanoid robots
Keywords - Humans
Keywords - hybrid warfare
Keywords - hyperledger composer
Keywords - Hypothesis testing
Keywords - ICT SCRM
Keywords - image recognition
Keywords - IN-SPIRE
Keywords - Industrial Control Systems
Keywords - Industrial Internet of Things (IIoT)
Keywords - industry
Keywords - influence operations
Keywords - information and communication technology
Keywords - Information and Communication Technology Supply Chain Risk Management
Keywords - information and communications technology
Keywords - information security
Keywords - information sharing
Keywords - information technology
Keywords - information technology vendors
Keywords - information warfare
Keywords - Infrastructure
Keywords - innovation
Keywords - Instance-based learning
Keywords - integrity
Keywords - intelligent agent
Keywords - Intelligent systems
Keywords - intent inferencing
Keywords - Interactions
Keywords - interdependence
Keywords - Interface
Keywords - invasive software
Keywords - IoT
Keywords - IP networks
Keywords - IT
Keywords - joint activity
Keywords - joint human-agent activity
Keywords - key practices
Keywords - key provisioning
Keywords - Knowledge extraction
Keywords - Knowledge representation
Keywords - knowledge-tracing
Keywords - learning (artificial intelligence)
Keywords - Learning systems
Keywords - learning-based classifier
Keywords - linear classifiers
Keywords - logistic regression
Keywords - machine learning
Keywords - machine learning algorithms
Keywords - machine unlearning
Keywords - machine-learning
Keywords - Malevolent Artificial Intelligence
Keywords - malicious activity
Keywords - malicious actors
Keywords - malicious apps
Keywords - malicious human action
Keywords - malware
Keywords - malware attacks
Keywords - malware detection
Keywords - Man machine systems
Keywords - Man-machine systems
Keywords - Management
Keywords - manufacturer
Keywords - manufacturing
Keywords - materiel
Keywords - Math
Keywords - Measurement
Keywords - medical systems
Keywords - metadata
Keywords - metric classification
Keywords - metric identification
Keywords - Metrics
Keywords - Microbiologic Systems
Keywords - Microsoft
Keywords - Microsoft Edge
Keywords - mimicry
Keywords - Mind
Keywords - Minimization
Keywords - mission impact assessment
Keywords - mission impact situation awareness
Keywords - MIT
Keywords - mobile vulnerability
Keywords - model steering functionality
Keywords - model tracing
Keywords - model-tracing
Keywords - modeling
Keywords - modeling framework
Keywords - moving target defense
Keywords - moving target defenses
Keywords - multi-agent systems
Keywords - multi-paradigm modeling
Keywords - National security
Keywords - NCSC
Keywords - network Contagion
Keywords - network formation
Keywords - network security
Keywords - network security data context
Keywords - network simulations
Keywords - networks
Keywords - neural nets
Keywords - neural network
Keywords - nonlinear classifiers
Keywords - NotPetya
Keywords - Ohio University
Keywords - Partial Attacker Valuation
Keywords - pattern classification
Keywords - Pattern recognition
Keywords - PE files
Keywords - Performance Metrics
Keywords - Pharmaceuticals
Keywords - physical threats
Keywords - pluggable
Keywords - Policy
Keywords - Politcs
Keywords - Political Campaigns
Keywords - politics
Keywords - portable executable files
Keywords - Press Release
Keywords - Prevention
Keywords - primitive systems
Keywords - prioritization
Keywords - prioritizing components
Keywords - prioritizing programs
Keywords - prioritizing systems
Keywords - privacy
Keywords - privacy risks
Keywords - private sector
Keywords - proactive cyber defense
Keywords - proactive strategies
Keywords - probability statistics
Keywords - Production
Keywords - program protection plan
Keywords - prototyping
Keywords - Quantification
Keywords - Quantum random number generator
Keywords - R&D
Keywords - radio frequency identification
Keywords - Random Forest
Keywords - Ransomeware
Keywords - ransomware attacks
Keywords - recommendation engine
Keywords - recommender systems
Keywords - red teamers
Keywords - regression analysis
Keywords - renewable energy
Keywords - resilience
Keywords - Resiliency
Keywords - Resilient Systems
Keywords - resource management
Keywords - RFID
Keywords - Risk
Keywords - risk assessment
Keywords - risk management
Keywords - risk management framework
Keywords - risk mitigation
Keywords - robotics
Keywords - robots
Keywords - Scams
Keywords - Science of Security
Keywords - SCRM
Keywords - SecDefender
Keywords - secure keys
Keywords - secure supply chain
Keywords - secure-learning paradigm
Keywords - security
Keywords - security controls
Keywords - Security games
Keywords - security measurement
Keywords - security of data
Keywords - security perspective
Keywords - Security Practices
Keywords - security programs & operations
Keywords - security regularization term
Keywords - semantic interaction
Keywords - Semantics
Keywords - Signal processing algorithms
Keywords - signaling scheme
Keywords - simulations
Keywords - situational awareness
Keywords - smart phones
Keywords - smart technology
Keywords - Social Behavior
Keywords - social media
Keywords - Software
Keywords - software & firmware
Keywords - software assurance
Keywords - Software Bill
Keywords - Software Policy
Keywords - software security
Keywords - software supply chain
Keywords - software supply chains
Keywords - software vendors
Keywords - software vulnerabilities
Keywords - Stackelberg Security Game
Keywords - static analysis
Keywords - statistical analysis
Keywords - statistical query learning
Keywords - Strategic Signaling
Keywords - structural integrity
Keywords - summation form
Keywords - supplier
Keywords - Supply Chain
Keywords - supply chain assurance
Keywords - supply chain attack
Keywords - Supply Chain Attacks
Keywords - supply chain dependencies
Keywords - Supply chain exploitation
Keywords - supply chain management
Keywords - supply chain risk
Keywords - supply chain risk assessment
Keywords - supply chain risk management
Keywords - supply chain risks
Keywords - supply chain security
Keywords - supply chains
Keywords - Support vector machines
Keywords - Surface treatment
Keywords - SVM
Keywords - Systems engineering and theory
Keywords - systems engineering process
Keywords - systems security engineering
Keywords - Task Analysis
Keywords - team player
Keywords - team working
Keywords - Teamwork
Keywords - Tech-Foundations
Keywords - Technical Paper
Keywords - Technology management
Keywords - testing
Keywords - third-party risk management
Keywords - threat
Keywords - threat assessment
Keywords - threat mitigation
Keywords - threat vectors
Keywords - threats
Keywords - timeliness violations
Keywords - Toolchains
Keywords - Training
Keywords - Training data
Keywords - training effectiveness
Keywords - trust
Keywords - trustworthiness
Keywords - Twitter
Keywords - twitter bots
Keywords - uncertainty
Keywords - unethical research
Keywords - usability perspective
Keywords - user analytic process
Keywords - user devices
Keywords - user evaluation
Keywords - user interaction methodology
Keywords - vaccine
Keywords - Vehicle Technology
Keywords - vendor
Keywords - vendor networks
Keywords - Vendors
Keywords - verification
Keywords - video
Keywords - visual analytics
Keywords - visualization
Keywords - visualization framework
Keywords - voting protocol mechanisms
Keywords - Vulnerability Management
Keywords - Water purification plant
Keywords - Windows API calls
Keywords - Windows application programming interface calls
Keywords - Winter Olympics
Keywords - workforce management practices
Keywords - YouTube
Topics - CPS Technologies
Topics - Science of Security
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2004
2003
3D printing
acquire
ACT-R
Ad Fraud
adaptability
adaptive cyber defense techniques
adaptive defensive cyber deception
adaptive face-recognition system
additive manufacturing
advanced cyber threat
advanced persistent threat
adversarial biometric recognition
adversarial evasion attacks
Adversarial Machine Learning
adversarial mind manipulation
agri-food
AI
AI technology
Alex Endert
Algorithm
Algorithms
Alternate Reality
ambiguous warfare
Analytical models
analytical reasoning
Android malware
android malware classifiers
Android Malware Detection
Android-based devices
Androids
Anti-Vaccine
application program interfaces
architectural framework
Articles for Review
Articles of Interest
artificial intelligence
Association
attack surface minimization
attacked network
attackers
authentication mechanisms
Automated
Automation
automation components
automotive cybersecurity
automotive supply chains
autonomous system
autonomous systems
Baseline criticality
Behavioral science
behavioral simulations
benchmark HMT
benchmark human-machine teams
Benchmark testing
Benchmarking
best practices
Biases
biometric recognition systems
biometric security
biometric system security
biometric systems
biometrics (access control)
blockchain
bots
Bounded Rationality
C-SCRM
C3E
C3E 2019
Call to Action
case study
Causal
classifier retraining technique
cloud & virtualization
cloud services
coactive design
code review
Cognition
cognitive architecture
Cognitive Biases
cognitive modeling
cognitive models
Cognitive Security
Cognitive Security in Cyber
Cogntive Security
Collaboration
commerce
Communication networks
Communications technology
Comodo cloud security center
complex data propagation network
complex systems engineering
compliance
Comprehensive National Cybersecurity Initiative
Compromise
compromise resilience
computation
Computational modeling
Computer architecture
Computer graphics
Computer hacking
computer network security
computer security
Computer simulation
Configuration Management
congestion
Containment
Context
context awareness
Context modeling
controls assessment
convolution
counterintelligence
CPS Technologies
critical components
critical infrastructure
critical network functions
critical programs
critical software systems
critical systems
criticality
criticality analysis
crowdsourcing
cryptoanalysis
cryptography
cyber
cyber attack
cyber attack and defense
cyber attackers
Cyber Attacks
cyber deception
cyber defense
cyber defense situational awareness
cyber friendly fire
cyber resilience
cyber resilience and security
Cyber Response
cyber risk
cyber security
cyber security analysis
cyber security exposure
cyber situation awareness
cyber supply chain
cyber supply chain risk management
cyber theft
cyber threat
cyber threats
cyber weaponry
cyber-attacks
Cyber-Decoys
Cyber-physical systems
Cyber-SCRM
cyber-security
Cyber-Supply Chain Risk Management
Cybercrime
cybersecurity
Cybersecurity Enhancement Act
Cybersecurity Strategy and Implementation Plan
Cyberspace
Cyberspace Policy Review
Dagger framework
Data
Data analysis
data lineage
data mining
Data models
Data Oversight
data privacy
Data security
data visualisation
Data visualization
Dayton
deception
deception attack detection
Deception Games
Deception Technology
decision making
decision making process
decision-making
Deep Fakes
Deepfakes
defense
delay
Department of Defense
design for debug
design for test
detection
digital ad fraud
digital supply chain system
Digital Watermarks
dimensional
Direct Digital Manufacturing
Displays
Distribution
DNI
Dynamic decision making
dynamic function allocation
dynamic proactive defenses
economic espionage
El Paso
Electric breakdown
electronics supply chain
embedded cognition
emergency services
emergent behaviors
emergent execution engineers
emerging threat
energy
Energy Sector
Entropy
equilibrium
ergonomics
espionage
EU elections
Evasion Attack and Defense
evasion attack model
evasion cost
EvnAttack
Executive Order
Executive Order 13636
external dependency management
Extraction
Extremism
face spoofing attack
Facebook
Fake Businesses
fake news
feature extraction
feature manipulations
feature modeling
feature selection
FireEye
firmware
food security
foreign policy
FORGE
Forgetting System
forgetting systems
formal
fuzzing
game theory
Generators
Google
Government
Graphics
hacker psychology
hackers
Hacking
Hardware
hardware security
Hardware Trojans
healthcare
healthcare industry
HMT
HMT-Context
Human Behavior in Cyber
human computer interaction
Human Decision Making
human factors
Human Machine Teaming
Human nature
human subject experiments
human-agent activity
human-agent-robot teamwork
human-centered computing
human-computer interaction
human-in-the-loop system design
human-machine teaming
human-machine teaming (HMT)
human-machine teaming; human-machine teams; architectural framework; dynamic function allocation; intent inferencing; machine learning
human-machine teams
human-robot interaction
Humanoid robots
Humans
hybrid warfare
hyperledger composer
hypothesis testing
ICT SCRM
image recognition
IN-SPIRE
industrial control systems
Industrial Internet of Things (IIoT)
Industry
influence operations
information and communication technology
Information and Communication Technology Supply Chain Risk Management
information and communications technology
Information security
information sharing
information technology
information technology vendors
information warfare
infrastructure
Innovation
Instance-based learning
integrity
intelligent agent
Intelligent systems
intent inferencing
Interactions
interdependence
Interface
invasive software
IoT
IP networks
IT
joint activity
joint human-agent activity
key practices
key provisioning
Knowledge extraction
knowledge representation
knowledge-tracing
learning (artificial intelligence)
Learning systems
learning-based classifier
linear classifiers
logistic regression
machine learning
machine learning algorithms
machine unlearning
machine-learning
Malevolent Artificial Intelligence
malicious activity
malicious actors
malicious apps
malicious human action
Malware
malware attacks
malware detection
Man machine systems
Man-machine systems
Management
manufacturer
Manufacturing
materiel
Math
Measurement
medical systems
metadata
metric classification
metric identification
Metrics
Microbiologic Systems
Microsoft
Microsoft Edge
mimicry
Mind
Minimization
mission impact assessment
mission impact situation awareness
MIT
mobile vulnerability
model steering functionality
model tracing
model-tracing
Modeling
Modeling Framework
moving target defense
moving target defenses
multi-agent systems
multi-paradigm modeling
National security
NCSC
network Contagion
network formation
Network security
network security data context
network simulations
networks
neural nets
Neural Network
nonlinear classifiers
NotPetya
Ohio University
Partial Attacker Valuation
pattern classification
Pattern recognition
PE files
Performance Metrics
Pharmaceuticals
physical threats
pluggable
policy
Politcs
Political Campaigns
politics
portable executable files
Press Release
Prevention
primitive systems
prioritization
prioritizing components
prioritizing programs
prioritizing systems
privacy
privacy risks
private sector
proactive cyber defense
proactive strategies
probability statistics
Production
program protection plan
Prototyping
quantification
Quantum random number generator
R&D
radio frequency identification
Random Forest
ransomeware
ransomware attacks
recommendation engine
recommender systems
red teamers
regression analysis
renewable energy
resilience
Resiliency
Resilient Systems
Resource management
RFID
risk
risk assessment
risk management
risk management framework
risk mitigation
Robotics
robots
Scams
science of security
SCRM
SecDefender
secure keys
secure supply chain
secure-learning paradigm
security
security controls
security games
security measurement
security of data
security perspective
security practices
security programs & operations
security regularization term
semantic interaction
Semantics
Signal processing algorithms
signaling scheme
simulations
situational awareness
smart phones
Smart technology
Social Behavior
social media
Software
software & firmware
software assurance
Software Bill
Software Policy
software security
software supply chain
software supply chains
software vendors
software vulnerabilities
Stackelberg Security Game
static analysis
statistical analysis
statistical query learning
Strategic Signaling
structural integrity
summation form
supplier
supply chain
supply chain assurance
supply chain attack
Supply Chain Attacks
supply chain dependencies
Supply chain exploitation
supply chain management
supply chain risk
supply chain risk assessment
supply chain risk management
supply chain risks
supply chain security
Supply chains
Support vector machines
Surface treatment
SVM
Systems engineering and theory
systems engineering process
systems security engineering
Task Analysis
team player
team working
Teamwork
Tech-Foundations
Technical Paper
Technology management
Testing
Theory of Minds
third-party risk management
Threat
Threat Assessment
threat mitigation
threat vectors
threats
timeliness violations
Toolchains
Track Materials
Training
Training data
training effectiveness
Trust
trustworthiness
Twitter
twitter bots
Uncertainty
unethical research
usability perspective
user analytic process
user devices
user evaluation
user interaction methodology
vaccine
Vehicle Technology
vendor
vendor networks
Vendors
verification
video
visual analytics
visualization
visualization framework
voting protocol mechanisms
Vulnerability Management
Water purification plant
Windows API calls
Windows application programming interface calls
Winter Olympics
workforce management practices
YouTube