Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
e-commerce
biblio
Evaluation of Performance for Big Data Security Using Advanced Cryptography Policy
Submitted by grigby1 on Fri, 11/18/2022 - 2:17pm
statistical analysis
Retail and Supply Chain
Privacy Preservation Technique
e-commerce
Advanced Cryptography Policy-ACP
Remote authentication
supply chain management
Data Security
Security Policies Analysis
pubcrawl
supply chains
Data Analytics
data analysis
data privacy
privacy
authentication
collaboration
policy-based governance
biblio
Designing Embodied Virtual Agent in E-commerce System Recommendations using Conversational Design Interaction
Submitted by aekwall on Fri, 08/26/2022 - 12:03pm
user experience
virtual agent
User-Centered Design
system recommendation
natural conversational framework
e-commerce
conversational design interaction
and usability testing
User centered design
usability
data privacy
electronic commerce
conversational agents
faces
Prototypes
Human behavior
Metrics
Scalability
pubcrawl
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Deep Interest Network for Click-Through Rate Prediction
Submitted by grigby1 on Tue, 12/10/2019 - 11:20am
click-through rate prediction
composability
compressive sampling
Cyber Physical System
cyber physical systems
display advertising
e-commerce
privacy
pubcrawl
resilience
Resiliency
biblio
Session-Based Recommendations Using Item Embedding
Submitted by grigby1 on Mon, 03/19/2018 - 2:04pm
Analogical Transfer
analogies
deep learning
e-commerce
glove
Human behavior
Human Factors
item embedding
pubcrawl
recurrent neural network
session-based recommender system
Transference
word embedding
Word2Vec
biblio
Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
pubcrawl
encryption
Human behavior
Information systems
internet
invasive software
legality
locker bot
malware
Metrics
Electronic mail
Ransomware
Resiliency
The Dark Net
Tor
trojan horse
Trojan horses
underground Web
Web threats
cryptolocker ransomware
bitcoin
bitcoin wallet
composability
Computer crime
Computers
consumer confidence
crypto virus
Cryptographic Protocols
Cryptography
Algorithm design and analysis
CTB locker
cyber crime
cyber ethics
cyber Laws
cyber wars
darknet
e-commerce
electronic commerce
biblio
Measuring Trust: The Simpler the Better?
Submitted by grigby1 on Tue, 05/16/2017 - 12:46pm
composability
e-banking
e-commerce
HCI
online trust
pubcrawl
questionnaire development
semantic differential
trust measure
trustworthiness
trustworthy
website quality
biblio
Internet of Things (IoT): Security challenges, business opportunities reference architecture for E-commerce
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
IoT
WiFi
supply chains
sensors
security of data
security industry
security challenges
security
RFID
reference architecture
pubcrawl170112
physical devices
Bluetooth
Internet of Things (IoT)
Internet of Things
internet
intelligent devices
electronic commerce
e-commerce
Databases
Connected Devices & Wearables
Cloud Computing
business opportunities
Business