Cognitive Identity Management: Risks, Trust and Decisions using Heterogeneous Sources
暂无分享,去创建一个
Keeley A. Crockett | S. N. Yanushkevich | W. G. Howells | K. A. Crockett | J. O’Shea | H. C. R. Oliveira | R. M. Guest | V. P. Shmerko | S. Yanushkevich | V. Shmerko | W. Howells | J. O'Shea | R. Guest | H. C. R. Oliveira
[1] Kamal Kant Bharadwaj,et al. Pruning trust–distrust network via reliability and risk estimates for quality recommendations , 2012, Social Network Analysis and Mining.
[2] Peter Spirtes,et al. Causal discovery and inference: concepts and recent methodological advances , 2016, Applied Informatics.
[3] Emal Pasarly. Time , 2011, Encyclopedia of Evolutionary Psychological Science.
[4] Brian A. Jackson,et al. Assessing the Effectiveness of Layered Security for Protecting the Aviation System Against Adaptive Adversaries , 2015 .
[5] Philippe Smets,et al. Target identification based on the transferable belief model interpretation of dempster-shafer model , 2004, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[6] D. Winterfeldt,et al. Cognitive and Motivational Biases in Decision and Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[7] Dong Liang,et al. A Risk Elimination Coordination Method for Large Group Decision-Making in Natural Disaster Emergencies , 2015 .
[8] Judea Pearl,et al. The seven tools of causal inference, with reflections on machine learning , 2019, Commun. ACM.
[9] Shawn Eastwood,et al. Technology Gap Navigator: Emerging Design of Biometric-Enabled Risk Assessment Machines , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).
[10] Vincenzo Piuri,et al. Biometric Recognition in Automated Border Control , 2016, ACM Comput. Surv..
[11] Minqiang Li,et al. A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis , 2014, Inf. Sci..
[12] Siyuan Liu,et al. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis , 2013, IEEE Transactions on Information Forensics and Security.
[13] Frederick Eberhardt,et al. Introduction to the foundations of causal discovery , 2017, International Journal of Data Science and Analytics.
[14] Shawn Eastwood,et al. Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders , 2017, IEEE Computational Intelligence Magazine.
[15] Wouter Joosen,et al. Managing distributed trust relationships for multi-modal authentication , 2018, J. Inf. Secur. Appl..
[16] Heather Rosoff,et al. Portfolio Analysis of Layered Security Measures , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[17] Khaled Mellouli,et al. Propagating belief functions in qualitative Markov trees , 1987, Int. J. Approx. Reason..
[18] Gian Luca Marcialis,et al. Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Kevin O'Connor,et al. A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes , 2017, IEEE Transactions on Human-Machine Systems.
[20] Mohamed Abouelenien,et al. Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities , 2017, IEEE Transactions on Information Forensics and Security.
[21] Shawn Eastwood,et al. Risk Assessment in Authentication Machines , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[22] Dmitry O. Gorodnichy,et al. Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications , 2016, IEEE Transactions on Human-Machine Systems.
[23] Svetlana N. Yanushkevich,et al. Generative Adversarial Network for Radar Signal Generation , 2020, ArXiv.
[24] Enrique Herrera-Viedma,et al. A visual interaction consensus model for social network group decision making with trust propagation , 2017, Knowl. Based Syst..
[25] Seth D. Guikema,et al. Risk assessment under deep uncertainty: A methodological comparison , 2017, Reliab. Eng. Syst. Saf..
[26] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[27] Philippe Weber,et al. Bayesian networks inference algorithm to implement Dempster Shafer theory in reliability analysis , 2008, Reliab. Eng. Syst. Saf..
[28] Luis M. de Campos,et al. Probability Intervals: a Tool for uncertain Reasoning , 1994, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[29] Gemma Galdon Clavell. Protect rights at automated borders , 2017, Nature.
[30] Didier Dubois,et al. Joint Propagation and Exploitation of Probabilistic and Possibilistic Information in Risk Assessment , 2006, IEEE Transactions on Fuzzy Systems.
[31] M. Francisca Hinarejos,et al. RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security , 2018, IEEE Transactions on Information Forensics and Security.
[32] Sibel Adali,et al. A Survey on Trust Modeling , 2015, ACM Comput. Surv..
[33] James O'Shea,et al. Do Europe's borders need multi-faceted biometric protection , 2017 .
[34] W. A. Shier,et al. Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure , 2018, IEEE Transactions on Intelligent Transportation Systems.
[35] Svetlana Yanushkevich,et al. Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening , 2019, Comput. Secur..
[37] Gi Mun Kim,et al. The causal relationship between risk and trust in the online marketplace: A bidirectional perspective , 2016, Comput. Hum. Behav..
[38] Ian Jenkinson,et al. An Offshore Risk Analysis Method Using Fuzzy Bayesian Network , 2009 .
[39] Sheldon H. Jacobson,et al. Optimal Aviation Security Screening Strategies With Dynamic Passenger Risk Updates , 2012, IEEE Transactions on Intelligent Transportation Systems.
[40] Keeley A. Crockett,et al. GDPR Impact on Computational Intelligence Research , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[41] Jay F. Nunamaker,et al. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals , 2014, J. Manag. Inf. Syst..
[42] Jorge Dias,et al. BUM: Bayesian User Model for Distributed Learning of User Characteristics From Heterogeneous Information , 2019, IEEE Transactions on Cognitive and Developmental Systems.
[43] Milan Stehlík,et al. On the favorable estimation for fitting heavy tailed data , 2010, Comput. Stat..
[44] Munindar P. Singh,et al. Evidence-based trust: A mathematical model geared for multiagent systems , 2010, TAAS.
[45] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[46] Keeley A. Crockett,et al. Intelligent Deception Detection through Machine Based Interviewing , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[47] Tim Bedford,et al. Approximate Uncertainty Modeling in Risk Analysis with Vine Copulas , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[48] Simon Haykin,et al. Cognitive Dynamic Systems: The perception–action cycle , 2012 .
[49] Jean Dezert,et al. UNM Digital Repository UNM Digital Repository Fusion of Sources of Evidence with Different Importances and Fusion of Sources of Evidence with Different Importances and Reliabilities Reliabilities , 2022 .
[50] Shawn Eastwood,et al. Taxonomy and Modeling of Impersonation in e-Border Authentication , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).
[51] James F. Baldwin,et al. Inference and learning in fuzzy bayesian networks , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[52] Anthony C. Davison,et al. Statistics of Extremes , 2015, International Encyclopedia of Statistical Science.
[53] M. Stewart,et al. Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks , 2018, Journal of Transportation Security.
[54] Reyer Zwiggelaar,et al. Thermal Facial Analysis for Deception Detection , 2014, IEEE Transactions on Information Forensics and Security.
[55] Manoj Kumar Tiwari,et al. Bayesian network modelling for supply chain risk propagation , 2018, Int. J. Prod. Res..