Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
User behavior
biblio
Research on Cloud End-User Behavior Trust Evaluation Model Based on Sliding Window
Submitted by grigby1 on Thu, 10/20/2022 - 3:16pm
computer science
trust evaluation model
cloud terminal
Optics
Resiliency
sliding window
Windows Operating System Security
Windows
User behavior
Cloud Computing
composability
Computational modeling
authentication
Conferences
resilience
Metrics
pubcrawl
biblio
The Influence of Mobile Operating Systems on User Security Behavior
Submitted by grigby1 on Fri, 07/29/2022 - 5:14pm
operating systems
User behavior
technology threat avoidance theory
Stakeholders
Resiliency
resilience
pubcrawl
privacy
Operating systems security
iOS Security
operating system
Mobile Security
ios
Cryptography
Conferences
appraisal
android
biblio
Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
Metrics
rough set dimensionality reduction
rough set
minimum risk Bayes decision
insider threat identification system model
impersonation detection
feedback tree
demensionality reduction
Bayes network
attribute information database
set theory
rough set theory
Accuracy
Bayes methods
User behavior
probability
insider threat
trees (mathematics)
Classification algorithms
information system security
Information systems
Identification
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Insider Threat Detection
security
Training
security of data
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
User Behavior Trust Modeling in Cloud Security
Submitted by aekwall on Mon, 11/23/2020 - 11:36am
User behavior
human trust
user trust value
user history patterns
user behavior trust modeling
user behavior trust model based on fuzzy logic
trust computation center
fuzzy login
could computing
cloud computing infrastructure
Human behavior
trust evaluation
cloud service providers
security of data
Human Factors
Cloud Security
Fuzzy logic
Mathematical model
Computational modeling
pubcrawl
Trusted Computing
History
security
Servers
Cloud Computing
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
Big Data
composability
DNS
fingerprint
Metrics
pubcrawl
resilience
Resiliency
Safe Coding
situational awareness
User behavior
biblio
Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
multistage attacks
Zero Day Attacks and Defense
user vulnerabilities
User behavior
technical security
system weaknesses
Spear-phishing
socio-technical vulnerabilities
socio-technical countermeasures
socio vulnerabilities dimension
socio factors
organizational management
nontechnical vulnerabilities
near zero-day malware
invasive software
internetworked computer users
inadequate cyber defenses
environmental factors
APT threats
APT attacks
advanced persistent threats (apt)
advanced persistent threats
Predictive Metrics
organisational aspects
composability
pubcrawl
Resiliency
biblio
Dancing Pigs or Externalities?: Measuring the Rationality of Security Decisions
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
Behavioral Modeling
decision science
empirical modeling
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
Security Risk Estimation
User behavior
biblio
BitTrusty: A BitCoin Incentivized Peer-to-Peer File Sharing System
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
incentives
white-washers
User behavior
Trusted Computing
Secure File Sharing
Resiliency
resilience
pubcrawl
penal actions
peer-to-peer file
Peer-to-peer computing
P2P network
P2P file sharing systems
P2P cryptocurrency networks
p2p
Metrics
bitcoin
Human Factors
Human behavior
honest peers
History
free-riders
Free riding
file sharing network
distributed systems
Conferences
computer network security
composability
collaborative distributed platform
blockchain
BitTorrent platform
BitTorrent
1
2
3
4
next ›
last »