- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0002000000000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
Feil-Seifer, Dave (2)
-
Ahmed, Habib (1)
-
La, Hung Manh (1)
-
Lupton, Ben (1)
-
Sengupta, Shamik (1)
-
Shrestha, Kripash (1)
-
Thom, Jay (1)
-
Washburn, Andrew (1)
-
Zappe, Mackenzie (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Human-robot interaction (HRI) studies have found people overtrust robots in domestic settings, even when the robot exhibits faulty behavior. Cognitive dissonance and selective attention explain these results. To test these theories, a novel HRI study was performed in a university library where participants were recruited to follow a package delivery robot. Participants then faced a dilemma to deliver a package in a private common room that might be off-limits. Then, they faced another dilemma when the robot stopped in front of an Emergency Exit door, and they had to trust the robot whether to open it or not Results showed individuals did not overtrust the robot and open the Emergency Exit door. Interestingly, most individuals demurred from entering the private common room when packages were not labeled, whereas groups of friends were more likely to enter the room. Then, selective attention was demonstrated by stopping participants in front of a similar Emergency Exit door and assessing whether they noticed it In one condition, only half of participants noticed it, and when the robot became more engaging no one noticed it. Additionally, a malfunctioning robot is exhibited, showing what kind of negative outcome was required to reduce trust.more » « less
-
Lupton, Ben; Zappe, Mackenzie; Thom, Jay; Sengupta, Shamik; Feil-Seifer, Dave (, Computing and Communication Workshop and Conference (CCWC))In recent years, there has been a growing interest in so-called smart cities. These cities use technology to connect and enhance the lives of their citizens. Smart cities use many Internet of Things (loT) devices, such as sensors and video cameras, that are interconnected to provide constant feedback and up-to-date information on everything that is happening. Despite the benefits of these cities, they introduce a numerous new vulnerabilities as well. These smart cities are now susceptible to cyber-attacks that aim to “alter, disrupt, deceive, degrade, or destroy computer systems.” Through the use of an educational and research-based loT test-bed with multiple networking layers and heterogeneous devices connected to simultaneously support networking research, anomaly detection, and security principles, we can pinpoint some of these vulnerabilities. This work will contribute potential solutions to these vulnerabilities that can hopefully be replicated in smart cities around the world. Specifically, in the transportation section of our educational smart city several vulnerabilities in the signal lights, street lights, and the cities train network were discovered. To conduct this research two scenarios were developed. These consisted of inside the network security and network perimeter security. For the latter we were able to find extensive vulnerabilities that would allow an attacker to map the entire smart city sub-network. Solutions to this problem are outlined that utilize an Intrusion Detection System and Port Mirroring. However, while we were able to exploit the city's Programmable Logic Controller (PLC) once inside the network, it was found that due to dated Supervisory Control and Data Acquisition (SCADA) systems, there were almost no solutions to these exploits.more » « less
An official website of the United States government
