Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Social Engineering for Diagnostic the Information Security Culture
Submitted by aekwall on Mon, 10/12/2020 - 10:46am
Phishing
Human Behavior and Cybersecurity
social engineering techniques
public university
ISCA survey questionnaire
information security culture assessment
Information Security Culture
information assets protection
information assets
controlled social engineering attacks
social engineering
security
security culture
sensitive information
Human Factors
Cybersecurity
confidential information
Computer crime
pubcrawl
Human behavior
data privacy
biblio
Person Identification from Visual Aesthetics Using Gene Expression Programming
Submitted by aekwall on Mon, 10/12/2020 - 10:46am
person identification
behavioral biometric
discriminatory features
feature recombination
Flickr users
Gene expression
gene expression programming
Genetics
online human interactions
aesthetics
personal activities
physical traits
professional activities
tree-based genetic approach
users aesthetic preferences
visual aesthetic
Human Behavior and Cybersecurity
programming
aesthetic feature dimensionality reduction
Behavioral biometrics
Head
Pattern recognition
visualization
biometrics (access control)
principal component analysis
human computer interaction
trees (mathematics)
Cybersecurity
pattern classification
social networking (online)
pubcrawl
Human behavior
feature extraction
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
Towards an Improved Understanding of Human Factors in Cybersecurity
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
security of data
Human behavior
pubcrawl
Cybersecurity
Bibliographies
computer security
psychology
Human Factors
social aspects of automation
cybersecurity-human-factors-personality-culture-demographics
human factor
secure digital environments
sociotechnical aspects
Human Behavior and Cybersecurity
biblio
FraudFind: Financial fraud detection by analyzing human behavior
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
auditing
Human Behavior and Cybersecurity
triangle of fraud
senior managers
semantic techniques
payroll employees
FraudFind
fraud triangle theory
financial fraud detection
financial audit model
Continuous Audit
bank fraud
Human Factors
human factor
security of data
Banking
financial data processing
behavioural sciences computing
fraud
Personnel
Data mining
Cybersecurity
tools
pubcrawl
Human behavior
Electronic mail
real-time systems
Organizations
biblio
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
Pricing
Human Behavior and Cybersecurity
textual features extraction
stock movements
stock markets
social media
price movements
potential cognitive hacking attacks
Information Gain
financial social media messages
financial market
Cognitive Hacking
abnormal behavior
Computer crime
Text Mining
cyber threats
cognition
Data mining
Economics
Companies
Cybersecurity
social networking (online)
Social network services
pubcrawl
Human behavior
feature extraction
biblio
A Conceptual Model for Promoting Positive Security Behavior in Internet of Things Era
Submitted by aekwall on Mon, 10/12/2020 - 10:43am
human factor
Human Behavior and Cybersecurity
security promotion
positive security behavior
IoT users
information security cycle
cyber risks
cyber resilience culture
conceptual model
Human behavior
IoT
public health sector
Human Factors
privacy
Cybersecurity
pubcrawl
telecommunication security
Internet of Things
data privacy
security of data
biblio
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Australia
Human Behavior and Cybersecurity
time pressure
thematic analysis
semi-structured interviews
integrative framework
insecure HCS behavior
human cybersecurity behavior
cybersecurity incidents
cybersecurity experts
cybersecurity contexts
security of data
Human Factors
Stakeholders
computer security
Interviews
Bibliographies
Cybersecurity
pubcrawl
Human behavior
Task Analysis
biblio
Cybersecure Distributed Voltage Control of AC Microgrids
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
secondary voltage control
power system security
Protocols
pubcrawl
Reactive power
reactive power control
resilience
resilience threshold
Resiliency
resilient control approach
resilient flocking
multi-robot systems
security of data
Synchronization
synchronization behavior
utilized control protocols
virtual time-varying communication graph
Voltage control
voltage restoration
weighted mean subsequence reduced algorithm
WMSR algorithm
distributed energy resources
communication links
Computing Theory
control engineering computing
cyber-attacks
cybersecure distributed voltage control
Cybersecurity
cyberthreats
Decentralized Control
DERs
distributed control
AC microgrids
distributed power generation
distributed secondary voltage control
frequency control
graph theory
malicious adversaries
microgrid test system
Microgrids
mobile robot team
mobile robots
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »