Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human behaviour
biblio
Accuracy Analysis for Predicting Human Behaviour Using Deep Belief Network in Comparison with Support Vector Machine Algorithm
Submitted by grigby1 on Fri, 03/31/2023 - 8:28am
belief networks
Predictive models
Organizations
Support vector machines
pubcrawl
Metrics
Analytical models
Computational modeling
computer science
prediction
computer vision
support vector machine
classification
human behaviour
Novel Deep Belief Network
biblio
A Treatise On Conversational AI Agents: Learning From Humans’ Behaviour As A Design Outlook
Submitted by grigby1 on Thu, 07/16/2020 - 12:31pm
Artificial Intelligence [AI]
behavioural sciences computing
centralized learning module
conversational agents
conversational AI agents
Human behavior
human behaviour
learning (artificial intelligence)
Machine Learning [ML]
Metrics
multi-agent systems
Natural Language Generation [NLG]
Natural Language Understanding [NLU]
pubcrawl
Scalability
treatise
biblio
Human Detection and Tracking on Surveillance Video Footage Using Convolutional Neural Networks
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
object detection
video surveillance
video signal processing
tracking algorithms
tracking algorithm
tracked movement
surveillance video footage
Surveillance video
spatial correlation filter
security system
Scalability
Resiliency
resilience
pubcrawl
convolutional neural nets
Metrics
learning (artificial intelligence)
image recognition
image filtering
human tracking
human position
human detection framework
human detection
human behaviour
deep video
Deep Learning Convolutional Neural Networks
deep learning
convolutional neural networks
biblio
Artificial Ambient Environments for Proximity Critical Applications
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
Infrared
Human Factors
two factor authentication
Relay Attacks
pubcrawl
Mobile Payments
human factor
human behaviour
Human behavior
experimental analysis
Contactless
Artificial Ambient Environment
biblio
Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
passthoughts
pubcrawl
two factor authentication
Usable Security
Human Factors
human factor
human behaviour
Human behavior
authentication
biblio
Fusion of Face Recognition and Facial Expression Detection for Authentication: A Proposed Model
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
two factor authentication
pubcrawl
authentication
identity verification
Human Factors
human factor
human behaviour
Human behavior
facial expression
face recognition
biometric
biblio
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
Usable Security
two factor authentication
socially-inclusive authentication
social cybersecurity
sensors
pubcrawl
Human Factors
human factor
human behaviour
Human behavior
HCI
authentication
biblio
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
multi-factor
authentication
biometrics
Human behavior
human behaviour
human factor
Human Factors
man-in-the-middle attack
mobile cloud computing
wireless
networks
pubcrawl
security
Sniffing
SSO
Two Factor
two factor authentication
biblio
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication
Submitted by grigby1 on Wed, 07/18/2018 - 10:23am
unlinkability
two factor authentication
Template Protection
pubcrawl
Multi-factor authentication
irreversibility
Human Factors
human factor
human behaviour
Human behavior
biometrics
biblio
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication
Submitted by grigby1 on Wed, 07/18/2018 - 10:23am
two-factor authentication
two factor authentication
Survey study
Security in organizations
pubcrawl
Human Factors
human factor
human behaviour
Bring-your-own-device
2FA
Human behavior
BYOD
1
2
next ›
last »