Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analysis of variance
biblio
Research on Intellectual Property Protection of Artificial Intelligence Creation in China Based on SVM Kernel Methods
Submitted by grigby1 on Thu, 09/07/2023 - 2:59pm
Resiliency
orthogonal design
KSVM
Analysis of variance
Data preprocessing
Measurement
Law
composability
intellectual property
information security
resilience
policy-based governance
pubcrawl
Artificial Intelligence
Support vector machines
security
machine learning
biblio
Effect of Timers on the Keystroke Pattern of the Student in a Computer Based Exam
Submitted by grigby1 on Fri, 03/03/2023 - 4:18pm
Countdown Timer
Two-Sample T-Test
Timer Stress
statistical test
One-Way ANOVA Test
Keystroke Pattern
Free Text
Exam Timer
Countup Timer
pubcrawl
keystroke analysis
keystroke dynamics
Analysis of variance
Stress
testing
information and communication technology
Metrics
Human behavior
biblio
Impacts of System Transparency and System Failure on Driver Trust During Partially Automated Driving
Submitted by aekwall on Mon, 02/01/2021 - 10:38am
driver trust
trust ratings
trust change
system-malfunction led trust reduction
system-limit
system transparency
system failure influence
system failure
supervisory control
partially automated vehicle
partially automated driving
Lead
flawless automated driving
automobiles
driver intervention
Automated vehicle
Analysis of variance
human trust
driver information systems
Trust in automation
automation
pubcrawl
Human behavior
Task Analysis
road vehicles
road safety
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 1:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide