Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Investment
biblio
AWR: Anticipate, Withstand, and Recover Resilience Metric for Operational and Planning Decision Support in Electric Distribution System
Submitted by grigby1 on Thu, 12/01/2022 - 11:56am
work factor metrics
Analytical models
Data models
Distribution system
graph theory
Investment
Measurement
Planning
Predictive models
pubcrawl
resilience
Resilience Metrics
resilience planning
Resiliency
Scalability
biblio
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage
Submitted by grigby1 on Thu, 07/08/2021 - 1:24pm
Virtual machining
virtual machine security
interdependency problem
hypervisor
Cyber Physical System
Investment
virtual machine
resource management
Virtual machine monitors
Cryptography
composability
Resiliency
resilience
pubcrawl
Servers
security
Cloud Computing
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
Trust Repair in Performance, Process, and Purpose Factors of Human-Robot Trust
Submitted by grigby1 on Wed, 02/03/2021 - 12:43pm
purpose
visual perception
trustworthiness perceptions
trust violations
trust violation
Trust Repair
trust
Task Analysis
subsequent trust behaviors
Service robots
Robot Trust
Resiliency
resilience
purpose perceptions
purpose factors
automation
pubcrawl
process
Performance
partner performance perceptions
organisational aspects
maintenance engineering
Investment
human-robot ttust
human-robot interaction
human-robot
Human Factors
Human behavior
HRI
distrust behaviors
biblio
Simulating the Effects of Social Presence on Trust, Privacy Concerns Usage Intentions in Automated Bots for Finance
Submitted by aekwall on Mon, 02/01/2021 - 10:41am
natural language interfaces
consumer trust
finance
financial advisory platforms
financial decisions
financial function
financial management
financial support purposes
financial technology
financially-sensitive information
human-to-human interaction
chatbot vignettes
perceived humanness
reliable chatbot
secure chatbot
social
Social presence
socio-emotional features
socio-emotional support
usage intentions
Vignette Emma
XRO23
chatbot
privacy concerns
Trusted Computing
Human behavior
pubcrawl
privacy
internet
Reliability
Industries
trust
Computers
data privacy
Decision support systems
Banking
User Perception
human trust
Investment
accessible banking
automated bots
automated decision technology
automated decisions
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
objective function
security investment maximization
mathematical programming
information security systems effectiveness
information security system effectiveness evaluation
information security controls optimization
generalized reduced gradient method
generalized efficiency criterion
formulated efficiency criterion
effectiveness evaluation
attack minimization
APT attacks
Investment
information security system
security of data
Mathematical model
advanced persistent threat attacks
APT attack
gradient methods
APT
advanced persistent threat
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
EEG-Based Neural Correlates of Trust in Human-Autonomy Interaction
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
Human behavior
trust
pubcrawl
power spectrum
neurophysiology
Mixed model analysis
medical signal processing
Investment
human-autonomy interaction
human trust
human factor
autonomous systems
Games
fourier analysis
feature extraction
electroencephalography signals
electroencephalography
eeg
Computational modeling
Brain modeling
brain
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Challenges of IoT Based Smart-Government Development
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
IoT based smart-government development
user study
Smart Government
smart cities
security of data
security
Resiliency
resilience
pubcrawl
privacy
policy-based governance
new generation smart government
collaboration
Investment
Internet of Things (IoT)
Internet of Things
Internet of Everything (IoE)
government data processing
Government 2.0
extended smart-government
Electronic government
e-governments
E-Government
Cybersecurity
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by willirn1 on Thu, 05/30/2019 - 3:04pm
Internet of Things
Vanderbilt
Transportation
security of data
security economics
security
resilient IIoT systems
resilience
Redundancy
production engineering computing
Investment
actuators
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
control
1
2
next ›
last »