Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
Easy Secure Login Implementation Using Pattern Locking and Environmental Context Recognition
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
Scalability
mobile computing
mobility features
pattern locking recognition
pattern locks
privacy
pubcrawl
resilience
Resiliency
lock screen application
secure login implementation
smart phones
smartphone application
testing
user privacy
Wi-Fi Mac Address
Wireless fidelity
wireless LAN
Ease of Use
authentication
authentication mechanism
authorisation
Context
Context Data
context data analysis
data analysis
data privacy
android
environmental context recognition
Global Positioning System
GPS location
Human behavior
human factor
Human Factors
invulnerable environment
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by Katie Dey on Mon, 09/09/2019 - 2:14pm
HMT
visualization framework
visualization
security
network security data context
network security
modeling framework
modeling
mission impact situation awareness
mission impact assessment
Knowledge representation
Interactions
Human Machine Teaming
C3E 2019
decision-making
Data visualization
data visualisation
Data models
Dagger framework
Cyberspace
cyber situation awareness
Context modeling
Context
computer network security
Computational modeling
Communication networks
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
Context-Based Security and Privacy for Healthcare IoT
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
patient-centric information
Human Factors
information collection
information sharing
Internet of Things
large scale connectivity
medical devices
medical information systems
Medical services
nursing staff
HIoT
physicians
privacy
pubcrawl
Real-time monitoring
regulatory compliance
Scalability
security
sensors
timely treatment
data privacy
Access controls
actuators
authorisation
Big Data
clinical staff
Context
context-based privacy
context-based security
context-sensitive role-based access control scheme
Access Control
expert systems
health care
health status
healthcare industry
healthcare innovation
healthcare Internet of things
healthcare IoT
healthcare knowledge
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
biblio
CallCab: A unified recommendation system for carpooling and regular taxicab services
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
passenger destinations
vehicles
unified recommendation system
transportation supply
Transportation
traffic information systems
taxicab trip distributions
Roads
regular taxicab services
recommender systems
real-time systems
passenger waiting time
CallCab
measure phase
MapReduce model
Intelligent Transportation Systems
GPS datasets
Global Positioning System
Dispatching
data driven approach
Context
Cities and towns
carpooling taxicab services
1536086
biblio
Dmodel: Online Taxicab Demand Model from Big Sensor Data in a Roving Sensor Network
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
pickup pattern
wireless sensor networks
Training
traffic information systems
taxicab business
sensors
roving taxicabs
roving sensor network
Roads
real-world logical information
real-time systems
real-time mobile sensors
Accuracy
passenger demand inference
passenger arriving moments inference
online taxicab demand model
mobile computing
Meteorology
inference mechanisms
Dmodel
customized online training
Context
big sensor data
Big Data
1536086
biblio
Indirect Context Suggestion
Submitted by grigby1 on Thu, 05/24/2018 - 12:11pm
Context
context suggestion
Human behavior
Human Factors
pubcrawl
recommender systems
resilience
Resiliency
Scalability
biblio
Authorship Attribution for Social Media Forensics
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
social networking (online)
multimodal data processing
prepaid SIM cards
pubcrawl
public Wi-Fi hotspots
smart phones
Smartphones
social media
social media forensics
Metrics
Speech
stylometry
supervised learning-based
user anonymity
user identification
Writing
writing style
authorship attribution
Media
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
Human behavior
habit peculiarities
Forensics
feature extraction
distributed networks
Digital Forensics
context exploitation
Context
computational linguistics
authorship attribution algorithm
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »