Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
psychology
biblio
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
Metrics
Writing
stylometry
Steady-State Genetic Algorithm
Steady-state
sentiment analysis
Semantics
pubcrawl
psychology
Adversarial Authorship
LIWC
Human behavior
GEFeS
Feature Selection
feature extraction
computer science
authorship attribution
biblio
Dynamic Psychological Game for Adversarial Internet of Battlefield Things Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
optimal IoBT devices
traditional dynamic Bayesian game
Signal to noise ratio
security
Scalability
Resiliency
resilience
pubcrawl
psychology
psychological sequential equilibrium
psychological network interdiction game
psychological game theory
psychological forward induction-based solution
psychological behavior
performance evaluation
adversarial Internet of Battlefield Things systems
novel game-theoretic framework
military communication
iobt
Internet of Things
Internet of battlefield things
Human Factors
Games
game theory
error statistics
dynamic psychological game
dynamic network interdiction game
desired bit error rate performance
Bit error rate
BER
biblio
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Submitted by K_Hooper on Wed, 02/14/2018 - 12:02pm
Human-computer interaction
visualization
user study
T-Viz
trust visualisations
Trust visualisation
Color
data visualisation
Decision Making
Human behavior
trust statements
human computer interaction
human trust
psychology
pubcrawl
Radar
Reliability engineering
stars interface
Trusted Computing
biblio
Measuring Personality for Automatic Elicitation of Privacy Preferences
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
personality trait
web applications
user privacy preferences
user personality traits
user connectivity
Scalability
Resiliency
pubcrawl
psychology
privacy protection
privacy preference
privacy
Policy
big data privacy
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
intelligent privacy management systems
Human Factors
Electronic mail
data privacy
Data collection
cultural differences
computer science
Big-Five personality traits
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
Human Factors
Web sites
user interface support
transport protocols
security
representative Webpage
pubcrawl
psychology
phishing Websites
phishing detection scenario
phishing attacks
Phishing
Knowledge engineering
ACT-R cognitive behaviour architecture model
human detection
human behaviour
Human behavior
HTTPS padlock security indicator
Decision Making
computer science
computer network security
computer model
Computer crime
computer architecture
Computational modeling
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering
biblio
Critical Analysis in the Research Area of Insider Threats
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
unintentional internal information security violation
taxonomy
Stress
Resiliency
pubcrawl
psychology
policy-based governance
Organizations
Monitoring
Metrics
Analytical models
insider threat modelling
insider espionage
insider behavior forecasting
Information systems
information security
Human Factors
Human behavior
detection of potential insiders
cyber sabotage
collaboration
biblio
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
Organizations
Terrorism
social force
social
scenario
pubcrawl170109
psychology
psychological force
psychological
Predictive models
Computer crime
motivation
Human Factors
Human behavior
digital technologies
cyberterrorism scenarios
cyberterrorism
cyber threats
Computer hacking
« first
‹ previous
1
2
3
4
5
6
next ›
last »