Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
biblio
Towards a Security Cost Model for Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
cyber attack
actuator security
security incident
security costs
security cost model
resulting costs
providing security
physical world
onion layer model
flexible systems
engineering secure systems
Cost of security
CPS
actuators
security of data
sensors
Measurement
Mathematical model
Industry 4.0
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Task Analysis
security
Cloud Computing
biblio
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
Internet of Things
Task Analysis
Servers
security-sensitive computation task
security of data
security
Scalability
resource allocation
Resiliency
pubcrawl
mobile computing
mixed integer programming multicommodity flow
Mixed integer programming
joint offloading approach
IoT application
IoT
Bandwidth
integer programming
greedy algorithms
greedy algorithm
fog-cloud provider
fog-cloud framework
Fog-cloud computing
Fog Computing and Security
delays
delay-aware secure computation offloading mechanism
Computational modeling
computation resources
computation offloading problem
completion delays
Cloud Computing
biblio
Deep Explanation Model for Facial Expression Recognition Through Facial Action Coding Unit
Submitted by aekwall on Mon, 12/30/2019 - 12:11pm
emotion classes
facial recognition
nonverbal emotional communication method
machine learning tasks
Justification
Hidden Markov models
Gold
FER tasks
facial muscle movements
facial expression recognition
facial action coding units
facial action coding unit
Facial Action Coding System
face recognition
Explanation Model
emotion recognition
Task Analysis
deep learning models
deep explanation model
CNN model
CK+ Dataset
deep learning
convolutional neural network model
convolutional neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Isa: Intuit Smart Agent, A Neural-Based Agent-Assist Chatbot
Submitted by aekwall on Mon, 12/16/2019 - 2:28pm
BiLSTM
neural-based agent-assist chatbot
Isa system
Intuit Smart Agent system
internal group messaging channels
goal oriented chatbot
electronic commerce
customer wait time
customer support agents
customer services
customer service agents
customer experience
Currencies
conversational AI
call centres
call centers
Scalability
B2C companies
Artificial Intelligence
conversational agent
software agents
conversation agents
Neural networks
recurrent neural nets
Companies
multi-agent systems
Metrics
pubcrawl
Human behavior
feature extraction
Task Analysis
biblio
Towards a Conversational Agent for Remote Robot-Human Teaming
Submitted by aekwall on Mon, 12/16/2019 - 2:27pm
Oils
telerobotics
Task Analysis
Scalability
Robot control
remote robots
remote robot-human teaming
pubcrawl
Poles and towers
operator situation awareness
operator control
conversational agents
Metrics
human-robot interaction
Human behavior
Furhat robot
Data collection
conversational agent
conversation agents
control engineering computing
autonomous systems
biblio
A Multiple Objective PSO-Based Approach for Data Sanitization
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
resilience
privacy-preserving and security
nondominated solutions
multiple objective PSO-based approach
multiple objective
multiobjective particle swarm optimization-based framework
grid-based algorithm
Itemsets
genetic algorithms
Data Sanitization
Compositionality
security
probability
privacy
Data mining
particle swarm optimization
particle swarm optimisation
optimization
pubcrawl
Human behavior
Task Analysis
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Games
universally composable security framework
universal composition operation
universal composability
Task Analysis
secure message communication
pubcrawl
proving simulation-based security
one-time-pad encryption
mechanized UC security analyses
Mechanization
ideally authenticated communication
ideal secure-communication functionality
ideal key-exchange functionality
hard computational problems
protocol verification
game-based security
formal verification
EASYCRYPT proof assistant
EasyCrypt
Diffie-Hellman protocol UC
Diffie-Hellman key-exchange
desired ideal functionality
Decisional Diffie-Hellman problem
Cryptography
Cryptographic Protocols
computer aided cryptography
composability
Complexity theory
complex protocols
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »