Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user study
biblio
Challenges of IoT Based Smart-Government Development
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
IoT based smart-government development
user study
Smart Government
smart cities
security of data
security
Resiliency
resilience
pubcrawl
privacy
policy-based governance
new generation smart government
collaboration
Investment
Internet of Things (IoT)
Internet of Things
Internet of Everything (IoE)
government data processing
Government 2.0
extended smart-government
Electronic government
e-governments
E-Government
Cybersecurity
biblio
Contextual permission models for better privacy protection
Submitted by Heather Lucas on Tue, 03/31/2020 - 10:29am
Access Control
machine learning
Mobile Permissions
permission models
privacy
security
Usable Security
user study
Policy-Governed Secure Collaboration
Scalability and Composability
Security Metrics Driven Evaluation, Design, Development, and Deployment
Understanding and Accounting for Human Behavior
ICSI
Human Behavior
Metrics
Policy-Governed Secure Collaboration
Scalability and Composability
Operationalizing Contextual Data
biblio
Evaluating How Interfaces Influence the User Interaction with Fully Autonomous Vehicles
Submitted by aekwall on Mon, 03/11/2019 - 9:35am
Scalability
Resiliency
pubcrawl
composability
autonomous vehicles
AVs
Interfaces
Level-4
Trust in automation
usability
user experience
user study
workload
Trust Routing
biblio
Sweet-spotting Security and Usability for Intelligent Graphical Authentication Mechanisms
Submitted by grigby1 on Thu, 08/23/2018 - 10:43am
Compositionality
security
user study
pubcrawl
composability
Cryptography
usability
computational intelligence
eye-tracking
recognition-based graphical authentication
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Submitted by K_Hooper on Wed, 02/14/2018 - 11:02am
Human-computer interaction
visualization
user study
T-Viz
trust visualisations
Trust visualisation
Color
data visualisation
Decision Making
Human behavior
trust statements
human computer interaction
human trust
psychology
pubcrawl
Radar
Reliability engineering
stars interface
Trusted Computing
biblio
Understanding User Satisfaction with Intelligent Assistants
Submitted by K_Hooper on Wed, 10/18/2017 - 9:11am
conversational agents
Human behavior
intelligent assistant
Metrics
mobile search
pubcrawl
Scalability
spoken dialogue system
user experience
user satisfaction
user study
file
Hibshi_Improving_Security_TB.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
biblio
Improving Security Requirements Adequacy An Interval Type 2 Fuzzy Logic Security Assessment System
Submitted by Jamie Presken on Thu, 12/08/2016 - 7:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
CMU
Jan'17