Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognition
biblio
XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems
Submitted by aekwall on Mon, 03/01/2021 - 5:00pm
Optimized production technology
XAI-Based system analysis
SWOT+CWW network
SWOT analyses
software tool
fuzzy SWOT maps network structure
Fuzzy SWOT Maps
explanation
explainable artificial intelligence
Dynamic SWOT analysis
computing with words
Fuzzy cognitive maps
Scalability
xai
FCM
cognitive systems
Artificial Intelligence
complex systems
cognition
software tools
fuzzy set theory
pubcrawl
Resiliency
real-time systems
biblio
Explainability in threat assessment with evidential networks and sensitivity spaces
Submitted by grigby1 on Tue, 02/16/2021 - 1:42pm
information fusion
belief functions
cables (electric)
Communication cables
evidence theory
evidential networks
Explainability
explanation abilities
graphical models
Damage Assessment
marine engineering
opportunity-capability-intent threat model
sensitivity spaces
source quality model
Underwater cables
underwater communication cables
vessel
pubcrawl
uncertainty handling
underwater acoustic communication
Sensitivity
marine communication
threat assessment
uncertainty
probability
inference mechanisms
Cost accounting
cognition
Artificial Intelligence
sensor fusion
telecommunication security
Resiliency
resilience
biblio
Learning in Motion: Dynamic Interactions for Increased Trust in Human-Robot Interaction Games
Submitted by grigby1 on Wed, 02/03/2021 - 1:42pm
human-robot interaction
social empathy
Robot Trust
Resiliency
resilience
pubcrawl
Humanoid robots
humanoid robot
human-robot interactions
human-robot interaction games trust
cognition
human perspective
Human Factors
Human behavior
embodied cognition
dynamic interactions
dance motion
computer games
cognitive science literature
biblio
Measuring Human Trust in a Virtual Assistant using Physiological Sensing in Virtual Reality
Submitted by aekwall on Mon, 02/01/2021 - 11:38am
heart rate variability
and virtual realities
auditory assistance
augmented
cognitive load
custom VR environment
galvanic skin response
H.1.2 [User/Machine Systems]: Human factors
H.5.1 [Information Interfaces and Presentation]: Multimedia Information Systems— Artificial
H.5.2 [User Interfaces]: Evaluation/methodology
human trust
heart-rate variability
human trust formation
physiological sensing
physiological sensor data
Skin
subjective mental effort questionnaire
Virtual Assistant
virtual reality based search task
interactive systems
Task Analysis
Human behavior
pubcrawl
Shape
Games
human computer interaction
cognition
Human Factors
user interfaces
smart devices
virtual reality
psychology
virtual agents
physiology
medical signal processing
electroencephalography
artificial intelligence technology
eeg
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
Semantics
Fuzzy Cryptography
partial agreement
Pareto-optimal solutions
Fuzzy sets
fuzzy ontology reasoning task
fuzzy ontologies
blockchain smart contracts
best satisfiability degree
Pareto optimisation
blockchain systems
fuzzy reasoning
Ethereum blockchain
inference mechanisms
Scalability
cognition
contracts
smart contracts
fuzzy set theory
cryptocurrencies
ontologies (artificial intelligence)
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Ontologies
biblio
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
Haskell
tools
Scalability
Resiliency
reasoning
pubcrawl
programming languages
programming differentially private analyses
programming
private data analyses
privacy
Human behavior
taint analysis
functional programming
differential privacy
Databases
data privacy
data analysis
data analyses results
concentration bounds
composability
cognition
accuracy concentration
Accuracy
biblio
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
Submitted by grigby1 on Mon, 12/28/2020 - 12:49pm
Metrics
Training
Task Analysis
steganalysis
Scalability
Resiliency
resilience
pubcrawl
Model-Selection
adaptive filtering
Labeling
information security
Gabor filters
FLD
feature extraction
Ensemble
cognition
Binary Relevance
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
experimental controls
traditional CTF events
Task Analysis
red team
pubcrawl
psychology
military computing
human performance
Human Factors
Human Behavior and Cybersecurity
Human behavior
human attacker
future cyber operations studies
capture the flag
deeply rooted human component
Data collection
cyber testing
cyber deception experiment
controlled human-subject experiment
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
computer security
Computer crime
Computer bugs
cognitive testing
cognition
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 11:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »