Cyber Vulnerability: An Attentional Dilemma
暂无分享,去创建一个
[1] Ben D. Sawyer,et al. Addressing Human Factors Gaps in Cyber Defense , 2016 .
[2] Stephen Rice. Examining Single- and Multiple-Process Theories of Trust in Automation , 2009, The Journal of general psychology.
[3] Joseph B. Lyons,et al. Being Transparent about Transparency: A Model for Human-Robot Interaction , 2013, AAAI Spring Symposium: Trust and Autonomous Systems.
[4] Joseph B. Lyons,et al. Exploring Trust Barriers to Future Autonomy: A Qualitative Look , 2017 .
[5] Brett J. Borghetti,et al. Coordinated Displays to Assist Cyber Defenders , 2016 .
[6] Joseph B. Lyons,et al. Certifiable Trust in Autonomous Systems: Making the Intractable Tangible , 2017, AI Mag..
[7] Leanne M. Hirshfield,et al. The Construct of State-Level Suspicion , 2013, Hum. Factors.
[8] Leanne M. Hirshfield,et al. The Role of Human Operators' Suspicion in the Detection of Cyber Attacks , 2019, Cyber Law, Privacy, and Security.