Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
competence
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
Mathematical model
variable perceived value congruence
Task Analysis
self-determination theory
Security policy compliant behaviour
Security Policies Analysis
security performance
security of data
Saudi Arabia
relatedness
pubcrawl
policy-based governance
Personnel
perceived value congruence
perceived legitimacy
organisational aspects
autonomy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
information security
Human Factors
Fortune 600 organization
employees motivation
Electronic mail
Data models
computer security
competence
collaboration
behavioral research
biblio
A Computational Model for Managing Impressions of an Embodied Conversational Agent in Real-Time
Submitted by grigby1 on Thu, 07/16/2020 - 12:32pm
learning (artificial intelligence)
Warmth
Videos
verbal behaviour
Scalability
reinforcement learning algorithm
real-time systems
pubcrawl
nonverbal behaviour
multi-agent systems
Metrics
machine learning approach
machine learning
competence
Impression Management
Human behavior
First Impressions
Facial Expressions Detection
Face
Embodied Conversational Agents
embodied conversational agent
conversational agents
Context modeling
Computational modeling
computational model
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 2:59pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy