Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automation
biblio
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness
Submitted by K_Hooper on Wed, 10/25/2017 - 10:50am
automation
Cyber Dependencies
Formal Security Models
Human behavior
Intrusion Detection Systems
Measurement
pubcrawl
resilience
Scalability
biblio
LAP: A Human-in-the-loop Adaptation Approach for Industrial Robots
Submitted by grigby1 on Thu, 10/19/2017 - 11:15am
automation
forward error correction
Forward Error Correction and Security
human-robot interaction
imitation learning
industrial robotics
industrial robots
intuitive teaching
pubcrawl
Resiliency
robot learning from demonstration
Scalability
security
biblio
AgentSmith: Exploring Agentic Systems
Submitted by K_Hooper on Wed, 10/18/2017 - 9:17am
agentic systems
automation
communication
ethics
HCI
Human Factors
pubcrawl
Scalability
Social Agents
biblio
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness
Submitted by grigby1 on Tue, 08/22/2017 - 11:11am
automation
composability
Formal Security Models
Intrusion Detection Systems
Measurement
Metrics
network intrusion detection
pubcrawl
Resiliency
biblio
Differences in Trust Between Human and Automated Decision Aids
Submitted by grigby1 on Tue, 05/16/2017 - 11:33am
automation
composability
compositionally
decision-making
expandability
Human behavior
human trust
pubcrawl
reliance
Resiliency
Risk
Strain
trust
Trust Routing
workload
biblio
A comprehensive inspection of cross site scripting attack
Submitted by grigby1 on Thu, 04/20/2017 - 11:38am
JavaScript
XSS vulnerability
XSS preventive measures
Web sites
Visual BASIC
VBScript
Uniform resource locators
Stored XSS
Servers
sensitive information access
security of data
Resiliency
Reflected XSS
pubcrawl
malware
malicious XSS link
ActiveX
Java
hypermedia markup languages
Human behavior
HTML
Flash
Electronic mail
Domed based XSS
Cross site scripting attack (XSS)
cross site scripting attack
Cross Site Scripting
computer security threat
composability
Browsers
automation
biblio
SCAP benchmark for Cisco router security configuration compliance
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
OVAL
XCCDF
vulnerability measurement
security of data
security content automation protocol
security compliance
security automation
security
SCAP benchmark
policy compliance evaluation
Science of Security
operating systems
NIST
information security management
Formal Specification
Cisco router security configuration compliance
business data processing
Benchmark testing
automation
pubcrawl
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation
file
p95-pearson.pdf
Submitted by drwright on Fri, 07/01/2016 - 12:42pm
automation
decision-making
reliance
Risk
Strain
trust
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
workload
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
Differences in Trust Between Human and Automated Decision Aids
Submitted by drwright on Fri, 07/01/2016 - 12:42pm
automation
decision-making
reliance
Risk
Strain
trust
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
workload
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »