Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognitive science
biblio
Hey! Preparing Humans to do Tasks in Self-adaptive Systems
Submitted by Jamie Presken on Wed, 01/12/2022 - 5:18pm
adaptive systems
cognition
cognitive science
collaboration
Probabilistic logic
Training
uncertainty
CMU
2021: July
biblio
Hey! Preparing Humans to do Tasks in Self-adaptive Systems
Submitted by Jamie Presken on Wed, 01/12/2022 - 5:18pm
Training
uncertainty
adaptive systems
collaboration
Probabilistic logic
cognition
cognitive science
biblio
Hey! Preparing Humans to do Tasks in Self-adaptive Systems
Submitted by Jamie Presken on Wed, 01/12/2022 - 5:18pm
Training
uncertainty
adaptive systems
collaboration
Probabilistic logic
cognition
cognitive science
biblio
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Submitted by grigby1 on Mon, 03/29/2021 - 12:15pm
privacy
user interface management systems
user interface design
user experience
usable security and privacy
tools
security perceptions
Scalability
pubcrawl
Protocols
cognitive science
Perceived security
Human Factors
human computer interaction
expert systems
ethical concerns
ethical aspects
encryption
Electronic mail
Cryptography
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 12:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
Care Robot Transparency Isn't Enough for Trust
Submitted by grigby1 on Tue, 12/01/2020 - 12:34pm
IEEE Regions
socially determined behaviour
robust trust
robot-made ethical decisions
Robot sensing systems
robot ethics
Resiliency
resilience
pubcrawl
patient trust
patient care
Medical services
medical robotics
machine transparency
Robot Trust
human-robot social interaction
human-robot interaction
Human Robot Interaction
Human Factors
Human behavior
healthcare robotics
ethics
ethical aspects
Decision Making
cognitive science
care robot transparency
care robot ethical decision-making
biblio
Robot Capability and Intention in Trust-Based Decisions Across Tasks
Submitted by grigby1 on Tue, 12/01/2020 - 12:25pm
Intention
Unmanned Aerial Vehicles
UAV agent
trust-based decisions
trust
Task Analysis
robust trust
robots
Robot Trust
robot intention
robot capability
Resiliency
resilience
pubcrawl
Meteorology
automation
human-subject study
human-robot interaction
Human Robot Collaboration
human mental models
Human Factors
human estimations
Human behavior
estimation
delegation situations
Decision Making
cognitive science
capability
autonomous aerial vehicles
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
End user Studies
Security by Default
User Perception
usable security and privacy
skilled attackers
signal protocol
secure messaging
pre-MME
pre-mass messenger encryption
post-MME
post-mass messenger encryption
Mental model
HCI
end-to-end encryption
Scalability
communication model
cognitive science
end-to-end security
whatsapp
authentication
Interviews
electronic messaging
pubcrawl
Resiliency
Protocols
data privacy
encryption
Cryptography
biblio
A scientific data provenance harvester for distributed applications
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
pubcrawl
Metrics
Performance
performance measurements
prestage provenance
process history
ProvEn
Provenance
Provenance Environment
provenance related information
provenance store
internet
relational databases
Resiliency
Science Integrated end-to-end Performance Prediction
scientific applications
scientific data provenance harvester
scientific information systems
Syntactics
tabular job management provenance
US Department of Energy Office of Science
electronic data interchange
Accelerated Climate Modeling
Accelerated Climate Modeling for Energy project
Atmospheric measurements
Atmospheric modeling
Biological and Environmental Research
cognitive science
composability
data analysis
Data models
Distributed Applications
Earth System Modeling program
Energy project
environmental factors
experimental rationale
Extreme Scientific Workflows project
file based evidence
HAPI
Harvester Provenance Application Interface syntax
harvesting
Human behavior
biblio
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
cyber-security game
Web sites
RL model
reinforcement-learning model
Reinforcement learning
pubcrawl170109
Probabilistic logic
learning (artificial intelligence)
Games
game-theoretic analysis
game theory
defender strategies
defender
defacing Website games
attacker
cyber-attacks
cyber security
Cost function
computer security
computer games
Computer crime
Computational modeling
cognitive science
cognitive modeling
behavioral game theory
attacks dynamics
attacker strategies