Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human trust
biblio
Robots that Take Advantage of Human Trust
Submitted by grigby1 on Tue, 12/01/2020 - 12:24pm
optimal actions
uncertain human
robust trust
Robot Trust
robot actions
Resiliency
resilience
rational-intelligent robots
pubcrawl
optimisation
communicative robot behavior
mobile robots
learning (artificial intelligence)
intelligent robots
human-robot interaction
human trust
Human Factors
Human behavior
game theory
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by aekwall on Mon, 11/23/2020 - 10:39am
recommender systems
trust relevancy degree
Social trust
social network information
personalized recommendation technology
personalized recommendation
personal characteristics
novel personalized recommendation algorithm
matrix factorization
ecommerce
Dianping datasets
human trust
Human behavior
Matrix decomposition
electronic commerce
Trusted Computing
data sparsity
data science
collaboration
trust
Data mining
Filtering
Training
Prediction algorithms
internet
social networking (online)
Social network services
collaborative filtering
pubcrawl
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
Digitized Trust in Human-in-the-Loop Health Research
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Artificial Intelligence
human-in-the-loop health research
human researchers
digitized trust
data transformations
collaborative health research environments
AI systems
human trust
Human behavior
hospitals
security of data
groupware
Pipelines
data privacy
blockchain technology
collaboration
trustworthiness
pubcrawl
computer architecture
Trusted Computing
biblio
TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
adaptive systems
trust-aware role-based access control system
trust-aware
trust threshold
TARAS mechanism
system integrity
public IoT environments
public Internet-of-Things
I-sharing
dynamic trust estimation
adaptive authorization
human trust
access rights
Human behavior
Access Control
Dynamic scheduling
security goals
Permission
IoT system
trust relationships
estimation
pubcrawl
Trusted Computing
Internet-of-Things
Internet of Things
authorization
authorisation
biblio
EEG-Based Neural Correlates of Trust in Human-Autonomy Interaction
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
Human behavior
trust
pubcrawl
power spectrum
neurophysiology
Mixed model analysis
medical signal processing
Investment
human-autonomy interaction
human trust
human factor
autonomous systems
Games
fourier analysis
feature extraction
electroencephalography signals
electroencephalography
eeg
Computational modeling
Brain modeling
brain
biblio
A Trust Logic for Pre-Trust Computations
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
Human behavior
human trust
trust logic
subjective logic
social systems
pre-trust computations
logical language
JØsang Subjective Logic
formal languages
computational trust model
computational trust
security of data
formal logic
Semantics
Syntactics
Feeds
uncertainty
social networking (online)
Computational modeling
pubcrawl
Trusted Computing
security
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »