Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cognition
biblio
New TSBuilder: Shifting towards Cognition
Submitted by aekwall on Mon, 05/18/2020 - 10:56am
supervised machine learning
cognition
artificial thinking
human thinking
multilayer Rosenblatt perceptron
natural language texts
new TSBuilder
rigid categorization
rigidity
Biological neural networks
term length
term system builder
term system building
term system construction
Text Mining
TSBuilder
word terms identification
Scalability
neural network
Data mining
natural language processing
text analysis
machine learning
Decision Making
Neurons
standards
deep learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Task Analysis
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
observational knowledge
user self-efficacy
Training
tools
Threat avoidance motivation and behaviour
threat avoidance motivation
structural knowledge
social cognitive theory
Self-Efficacy
pubcrawl
phishing threat prevention behaviour
phishing threat avoidance behaviour
phishing attacks
phishing attack
Phishing
online identity theft attack
Human Behavior and Cybersecurity
knowledge attributes
Knowledge
internet
Human Factors
Human behavior
heuristic knowledge
gaming prototype
gamified approach
Gamification/Gamified approach
Games
Electronic mail
Computers
computer games
Computer crime
cognition
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
belief propagation
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
Intrusion Detection Systems
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
Correlation
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
security of data
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
biblio
Deliberative and Affective Reasoning: a Bayesian Dual-Process Model
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
Intelligent Agents
affective reasoning
Artificial agents
BayesAct agents
Bayesian dual-process model
computationally tractable model
decision theoretic reasoning
emotional level
free energy
human experience
human social networks
affective alignment
intelligent computational agents
plausible model
social experiences
social order
social sciences computing
social-psychological Bayesian affect control theory
social-psychological theory
socio-technical system
sociological theory
technological agents
inference mechanisms
Bayes methods
pubcrawl
Computational modeling
multi-agent systems
collaboration
chatbots
Complexity theory
cognition
Human Factors
Markov Decision Process
Scalability
Artificial Intelligence
Biological system modeling
affective computing
human interaction
social interactions
psychology
Social Agents
active inference
affect control theory
biblio
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
security of data
internet
knowledge graph
pubcrawl
resilience
Resiliency
Scalability
SCTD
security knowledge-based defense mechanism
information-centric networking
semantic obfuscation
semantic reasoning
semantic relations
Semantics
smart based defense mechanism
smart reasoning algorithms
smart reasoning based content threat defense
subscription-based naming mechanism
Extranets
cognition
computer architecture
content semantic awareness
content threats
content-based defense mechanism
context communication content
distributed processing
edge computing
blacklisting
fog computing based defense mechanism
ICN edge defense system
ICN protocols
ICN semantic features
inference mechanisms
Information Centric Network
Information Centric Networks
biblio
Research and Design of Subway BAS Intrusion Detection Expert System
Submitted by grigby1 on Thu, 01/02/2020 - 2:45pm
Public transportation
urban rail transit system
the inference engine
targeted intrusion detection expert system
subway equipment
subway BAS intrusion detection expert System
security of data
security
Scalability
Resiliency
resilience
railways
rail transit system
rail traffic
Rails
Building automation system
pubcrawl
knowledge base
intrusion detection system
Intrusion Detection
information security
inference mechanisms
inference engine
Human behavior
expert systems
expert system
Engines
cognition
building management systems
biblio
Formal Security Verification of Concurrent Firmware in SoCs Using Instruction-Level Abstraction for Hardware*
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
resilience
Metrics
microprocessor chips
Microprogramming
multi-threading
multithreaded program verification problem
Predictive Metrics
program verification
pubcrawl
intellectual property security
Resiliency
Secure Boot design
security of data
SoC security verification
software verification techniques
system-on-chip
Systems-on-Chip
cyber-physical systems
architecture level
bit-precise reasoning
cognition
composability
Concurrency
concurrency (computers)
concurrent firmware
cyber-physical system
Access Control
firmware
firmware-visible behavior
formal security verification
Frequency modulation
Hardware
Instruction-Level Abstraction
intellectual property blocks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »