Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
susceptibility
biblio
Modeling the Role of the Buildup of Magnetic Charges in Low Anisotropy Polycrystalline Materials
Submitted by aekwall on Mon, 09/30/2019 - 10:08am
remanence
Magnetometers
negative-field cooling
Perpendicular magnetic anisotropy
phenomenological energy barriers
polycrystalline gadolinium
polymer structure
positive-field warming
pubcrawl
magnetocaloric effects
remnant magnetization
Soft magnetic materials
soft-magnetic materials
Stoner-Wohlfarth-type model
Stoner–Wohlfarth model
susceptibility
Temperature measurement
thermal relaxation
gadolinium
Resiliency
Compositionality
Internet of Things
cyber physical systems
Anisotropic magnetoresistance
anisotropy field
composability
demagnetisation
Magnetic Remanence
grain boundaries
low anisotropy polycrystalline materials
Magnetic anisotropy
magnetic charges
magnetic susceptibility
Magnetization
magneto-thermal characteristics
biblio
Immunity assessment of a servomotor exposed to an intentional train of RF pulses
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
intentional interference
susceptibility
smart intentional electromagnetic interference
Servomotors
servomotor
robots
robotics
RF pulses
Resiliency
resilience
radio frequency pulses
Radio frequency
pubcrawl
Off-The-Shelf servomotor
intentional train
automated production lines
industrial process
Induction motors
immunity assessment
functional safety
EMC
Electromagnetics
electromagnetic interference
electromagnetic fields
electromagnetic field
electromagnetic compatibility
DC motors
Damage Assessment
cyber-attacks
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Phishing in International Waters: Exploring Cross-national Differences in Phishing Conceptualizations Between Chinese, Indian and American Samples
Submitted by emerson on Wed, 09/17/2014 - 6:30pm
Science of Security
Foundations
ACM CCS
China
cultural differences
foundations
Human and Societal Aspects of Security and Privacy
India
information privacy
Intrusion/Anomaly Detection and Malware Mitigation
nationality
online privacy
Phishing
Privacy Protections
Science of Security
Social Aspects of Security and Privacy
Social Engineering Attacks
susceptibility
ACM CCS
Information Privacy
Phishing
Privacy Protections
Social Aspects of Security and Privacy
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
file
Phishing In International Waters
Submitted by emerson on Tue, 06/03/2014 - 5:35pm. Contributors:
Emerson Murphy-Hill
Chris Mayhorn
Rucha Tembe
Olga Zielinska
Yuqi Liu
Kyung Wha Hong
Xi Ge
China
cultural differences
India
nationality
online privacy
susceptibility
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing