Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Mitigating Circumstances in Cybercrime: A Position Paper
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Media
warning messages
user cyber behaviour
software features
software engineering
Software
social responsibility
pubcrawl170109
psychology
mitigating circumstances
Mental disorders
circumstance mitigation
law aspect
irrational unconscious actions
interrelation analysis
Digital Forensics
Decision Making
cyberspace design
Cyberspace
Cybercrime
cyber psychology
Computer crime
biblio
Challenges in Architecting Fully Automated Driving; with an Emphasis on Heavy Commercial Vehicles
Submitted by grigby1 on Tue, 03/07/2017 - 1:04pm
Science of Security
fully automated driving
heavy commercial vehicles
automated vehicles
navigation
Decision Making
autonomous driving intelligence
legacy platforms
fail-safe design
fault-operational behaviour
safety requirements
safety standards
biblio
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
global flow diagram
Virtual machining
unauthorized access risks
unauthorized access
security of data
pubcrawl170108
pubcrawl170107
multilevel hybrid cloud algorithm
legitimacy detection
graph theory
global flow graph
Access Control
Frequency modulation
formal representation
detection algorithms
detection algorithm
Decision Making
data access
Cloud Computing
Algorithm design and analysis
access violation
biblio
"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Submitted by grigby1 on Thu, 02/23/2017 - 12:56pm
human-like decision making
user trustworthiness
ubiquitous computing scenarios
ubiquitous computing
Trusted Computing
trust model
security
pubcrawl170105
pervasive computing
pattern classification
network interactions
naïve Bayes classifier
Itemsets
Apriori algorithm
effective trust model
Decision Making
Data mining
computers arena
computational services distribution
Computational modeling
Classification algorithms
behavioral patterns
Bayes methods
artificial intelligence-based trust model
Artificial Intelligence
file
Optimisation of Data Collection Strategies for Model-Based Evaluation and Decision-Making
Submitted by Anonymous on Wed, 05/06/2015 - 3:39pm. Contributors:
Robert Cain
Aad van Moorsel
Modeling
Decision Making
evaluation
HotSoS 2015
Academia
Poster
Posters
file
Quantitative Security Metrics with Human in the Loop
Submitted by whs on Wed, 05/06/2015 - 12:04pm. Contributors:
Mohammad Noureddine
Ken Keefe
William H. Sanders
Masooda Bashir
Modeling
Decision Making
Human behavior
Human Factors
HotSoS 2015
Academia
Poster
Posters
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile ad hoc network security
trust-based multicast routing protocol
trust model
telecommunication security
Routing protocols
network trust dynamic adaptability
network interaction quality
multiple trust decision factor
multicast protocols
multi-agent systems
multi-agent system
mobile ad hoc networks
analytic hierarchy process
malicious node detection
information-theoretic framework
fuzzy theory
fuzzy set theory
Fuzzy logic
fuzzy analytic hierarchy process theory
FAPtrust
entropy weight method
decision-making
Decision Making
biblio
Integrity of a common operating picture in military situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:41pm
Microwave integrated circuits
Wireless communication
Weight measurement
situational awareness information
situational awareness
military situational awareness
military operations
military computing
military command and control
C2
integrity
Decision Making
COP integrity
common operating picture integrity
Common Operating Picture
command and control systems
command and control
Cameras
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
biblio
A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
nonfunctional quality
wide-area monitoring and control systems (WAMCS)
wide area monitoring and control systems interoperability
WAMC ICT architecture
Unified modeling language
SCADA systems
real time situational awareness
Protocols
power systems
power system security
power system measurement
power system management
open systems
Analytical models
next generation operational management system
Network interfaces
interoperability
information and communication technology
enterprise architecture method
enterprise architecture analysis
Electric Power System
Decision Making
cybersecurity analysis
Cybersecurity
computer security
Communication Systems
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »