Follow
Robert H Thomson
Robert H Thomson
United States Military Academy
Verified email at westpoint.edu
Title
Cited by
Cited by
Year
The future cybersecurity workforce: going beyond technical skills for successful cyber performance
J Dawson, R Thomson
Frontiers in psychology 9, 744, 2018
2702018
A functional model of sensemaking in a neurocognitive architecture
C Lebiere, P Pirolli, R Thomson, J Paik, M Rutledge-Taylor, J Staszewski, ...
Computational intelligence and neuroscience 2013 (1), 921695, 2013
1092013
A general instance-based learning framework for studying intuitive decision-making in a cognitive architecture
R Thomson, C Lebiere, JR Anderson, J Staszewski
Journal of Applied Research in Memory and Cognition 4 (3), 180-190, 2015
832015
Human, model and machine: a complementary approach to big data
R Thomson, C Lebiere, S Bennati
Proceedings of the 2014 Workshop on Human Centered Big Data Research, 27-31, 2014
382014
Insider threat detection: a solution in search of a problem
JR Schoenherr, R Thomson
2020 International Conference on Cyber Security and Protection of Digital …, 2020
252020
Constraining Bayesian inference with cognitive architectures: An updated associative learning mechanism in ACT-R
R Thomson, C Lebiere
Proceedings of the annual meeting of the cognitive science society 35 (35), 2013
232013
Systems and methods for data driven malware task identification
P Shakarian, E Nunes, C Buto, C Lebiere, R Thomson, S Bennati
US Patent 10,176,438, 2019
202019
An Account of Associative Learning in Memory Recall.
R Thomson, A Pyke, LM Hiatt, JG Trafton
CogSci, 2015
202015
Enhancing Military Training Using Extended Reality: A Study of Military Tactics Comprehension
MW Boyce, RH Thomson, JK Cartwright, DT Feltner, CR Stainrod, J Flynn, ...
Frontiers in Virtual Reality, 77, 2022
182022
Toward a psychology of deep reinforcement learning agents using a cognitive architecture
K Mitsopoulos, S Somers, J Schooler, C Lebiere, P Pirolli, R Thomson
Topics in Cognitive Science 14 (4), 756-779, 2022
172022
Predicting individual differences to cyber attacks: Knowledge, arousal, emotional and trust responses
A Pyke, E Rovira, S Murray, J Pritts, CL Carp, R Thomson
Cyberpsychology: Journal of Psychosocial Research on Cyberspace 15 (4), 2021
172021
Knowledge-to-information translation training (kitt): An adaptive approach to explainable artificial intelligence
R Thomson, JR Schoenherr
Adaptive Instructional Systems: Second International Conference, AIS 2020 …, 2020
172020
Cognitive-level salience for explainable artificial intelligence
S Somers, K Mitsopoulos, C Lebiere, R Thomson
Proceedings of the 17th Annual Meeting of the International conference on …, 2019
172019
An account of interference in associative memory: Learning the fan effect
R Thomson, AM Harrison, JG Trafton, LM Hiatt
Topics in cognitive science 9 (1), 69-82, 2017
172017
Extending the influence of contextual information in ACT-R using buffer decay
R Thomson, S Bennati, C Lebiere
Proceedings of the annual meeting of the cognitive science society 36 (36), 2014
162014
The Cybersecurity (CSEC) Questionnaire: Individual Differences in Unintentional Insider Threat Behaviours
JR Schoenherr, R Thomson
Cyber Science 2021, 2021
152021
Functional cognitive models of malware identification
C Lebiere, S Bennati, R Thomson, P Shakarian, E Nunes
Proceedings of ICCM, ICCM, 9-11, 2015
152015
Identifying new team trust and team cohesion metrics that support future human-autonomy teams
A Milner, DH Seong, RW Brewer, AL Baker, A Krausman, D Chhan, ...
Advances in Simulation and Digital Human Modeling: Proceedings of the AHFE …, 2021
122021
Malware task identification: A data driven approach
E Nunes, C Buto, P Shakarian, C Lebiere, S Bennati, R Thomson, ...
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
112015
Malware identification using cognitively-inspired inference
R Thomson, C Lebiere, S Bennati, P Shakarian, E Nunes
Proceedings of BRIMS, BRIMS, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20