|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1548 occurrences of 955 keywords
|
|
|
Results
Found 7091 publication records. Showing 7090 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich |
A layered decision model for cost-effective network defense. |
IRI |
2005 |
DBLP DOI BibTeX RDF |
|
76 | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
Design space and analysis of worm defense strategies. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation |
73 | Jelena Mirkovic, Max Robinson, Peter L. Reiher |
Alliance formation for DDoS defense. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
|
66 | Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 |
Distributed Defense Against Distributed Denial-of-Service Attacks. |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Toby Ehrenkranz, Jun Li 0001 |
On the state of IP spoofing defense. |
ACM Trans. Internet Techn. |
2009 |
DBLP DOI BibTeX RDF |
spoofing defense, spoofing packet, packet filtering, IP spoofing |
62 | Igor V. Kotenko, Alexander Ulanov |
Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. |
AIS-ADM |
2007 |
DBLP DOI BibTeX RDF |
adaptation and learning in multi-agent systems, security simulation, network attacks and defense, applications |
62 | Ying Xu, Roch Guérin |
On the robustness of router-based denial-of-service (DoS) defense systems. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
router-based defense, denial-of-service |
59 | Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong |
Adaptive Defense Against Various Network Attacks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
55 | David Bénichou, Serge Lefranc |
Introduction to Network Self-defense: technical and judicial issues. |
J. Comput. Virol. |
2005 |
DBLP DOI BibTeX RDF |
Network self defense, Retaliation, Response intrusion, Legal issues |
52 | Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke |
Rationality Validation of a Layered Decision Model for Network Defense. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Feng Zhang, Zhiguang Qin, Shijie Zhou |
Policy-Tree Based Proactive Defense Model for Network Security. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Yichuan Jiang, YiPing Zhong, Shiyong Zhang |
A Topology-Adapted Network Defense Model Based on Mobile Agent. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Dave McMahon |
Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security. |
Best Practices in Computer Network Defense |
2014 |
DBLP DOI BibTeX RDF |
|
48 | Junfeng Tian, Min Peng, Yuling Liu |
A New Active DDoS Defense System Based on Automatic Learning. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
active defense, neural network, statistical analysis, DDoS, traffic monitoring |
45 | Igor V. Kotenko, Alexander Ulanov |
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
Cooperative distributed defence, Simulation, DDoS, Network attacks |
45 | Igor V. Kotenko, Alexander Ulanov |
Simulation of Internet DDoS Attacks and Defense. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security |
45 | Eunmi Ham, Woojin Paik |
Identifying Text Discourse Structure of the Narratives Describing Psychiatric Patients' Defense Mechanisms. |
FinTAL |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Zhongwen Li, Yang Xiang 0001, Dongsheng He |
Simulation and Analysis of DDoS in Active Defense Environment. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Yanxiang He, Wei Chen 0006, Wenling Peng, Bin Xiao 0001 |
An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Mihui Kim, Kijoon Chae |
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Wei Jiang, Binxing Fang, Hongli Zhang 0001, Zhihong Tian, Xin-fang Song |
Optimal Network Security Strengthening Using Attack-Defense Game Model. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Security Strengthening, Defense Graph, Attack-Defense Game, Internet Security, Cost metrics |
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. |
RFC |
1991 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. |
RFC |
1990 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. |
RFC |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. |
RFC |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
Ethics and the Internet. |
RFC |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. |
RFC |
1988 |
DBLP DOI BibTeX RDF |
|
43 | Benjamin W. Priest, George Cybenko, Satinder Singh 0001, Massimiliano Albanese, Peng Liu 0005 |
Online and Scalable Adaptive Cyber Defense. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Michael P. Wellman, Thanh Hong Nguyen, Mason Wright |
Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Zhisheng Hu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 |
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko |
Moving Target Defense Quantification. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
43 | |
Recent Advances in Computational Intelligence in Defense and Security. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Andrea Rigoni, Gustav Lindstrom |
Computer Network Defense: New Threats and Trends. |
Best Practices in Computer Network Defense |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Elly van den Heuvel, Gerben Klein Baltink |
Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond. |
Best Practices in Computer Network Defense |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Ang Cui, Salvatore J. Stolfo |
Symbiotes and defensive Mutualism: Moving Target Defense. |
Moving Target Defense |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Ehab Al-Shaer |
Toward Network Configuration Randomization for Moving Target Defense. |
Moving Target Defense |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Georgios Portokalidis, Angelos D. Keromytis |
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. |
Moving Target Defense |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel |
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov |
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
41 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
41 | Leigh Flagg, Gordon Streeter, Andrew Potter |
Bringing knowledge to network defense. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
cyber defense training, decision support, situational awareness, network-centric warfare |
41 | Martin R. Stytz |
Considering Defense in Depth for Software Applications. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
defense-in-depth, software development, software tools, attack, software security |
38 | Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove |
An analysis of social network-based Sybil defenses. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
social network-based Sybil defense, communities, social networks, sybil attacks |
38 | Frederick I. Moxley |
On the specification of complex software systems. |
ICECCS |
1996 |
DBLP DOI BibTeX RDF |
complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification |
38 | Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma 0010 |
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Sharon Bewick, Mingjun Zhang, William R. Hamel, Ruoting Yang |
Passive vs. aggressive strategies: A game theoretic analysis of military defense. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Wei Jiang, Zhihong Tian, Hongli Zhang 0001, Xin-fang Song |
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Gregory Levitin |
Optimal Defense Strategy Against Intentional Attacks. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Raman Sharykin, Phillip A. Porras |
Applying Formal Evaluation to Worm Defense Design. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 |
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin |
Apply Data Mining to Defense-in-Depth Network Security System. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan |
A Defense-Centric Taxonomy Based on Attack Manifestations. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Wojciech Jamroga |
A Defense Model for Games with Incomplete Information. |
KI/ÖGAI |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Tuncer I. Ören, Susan K. Numrich, Adelinde M. Uhrmacher, Linda F. Wilson, Erol Gelenbe |
Agent-directed simulation: challenges to meet defense and civilian requirements. |
WSC |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou |
How Many Attackers Can Selfish Defenders Catch? |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Mihui Kim, Jaewon Seo, Kijoon Chae |
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. |
SEUS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga |
A Framework for Conceptualizing Social Engineering Attacks. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
system archetype, pattern recognition, information security, system dynamics, critical infrastructure, Social engineering |
35 | Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé |
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. |
Annual Simulation Symposium |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher |
DefCOM: Defensive Cooperative Overlay Mesh. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | B. A. Batchelder |
ADAM (Attrition Damage Assessment Model. |
Commun. ACM |
1961 |
DBLP DOI BibTeX RDF |
weapons effectiveness, programming, Monte Carlo method, computer simulation, computer application |
34 | William W. Agresti |
The Four Forces Shaping Cybersecurity. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Reconnaissance fingerprinting, Network defense, Security Cybersecurity, Cyberterrorists, Rebranding, National defense, Information technology |
34 | Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena |
BitBlaze: A New Approach to Computer Security via Binary Analysis. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis |
34 | Jeffrey A. Mattson |
Cyber Defense Exercise: A Service Provider Model. |
World Conference on Information Security Education |
2007 |
DBLP DOI BibTeX RDF |
Cyber Defense Exercise, Training Information Assurance Professionals, Information Security Education |
34 | Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu |
Port and Address Hopping for Active Cyber-Defense. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping |
34 | Duminda Wijesekera, James Bret Michael, Anil Nerode |
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
Ballistic Missile Defense Policy, Agents |
34 | Michael V. Capps, Perry McDowell, Michael Zyda |
A Future for Entertainment-Defense Research Collaboration. |
IEEE Computer Graphics and Applications |
2001 |
DBLP DOI BibTeX RDF |
Defense and entertainment collaboration, virtual environments and simulation, modeling, networks, interactive entertainment |
33 | Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman |
Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | George Cybenko, Michael P. Wellman, Peng Liu 0005, Minghui Zhu |
Overview of Control and Game Theory in Adaptive Cyber Defenses. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen |
Adaptive Cyber Defenses for Botnet Detection and Mitigation. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam |
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis |
Control-Theoretic Approaches to Cyber-Security. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu 0005 |
MTD Techniques for Memory Protection Against Zero-Day Attacks. |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin |
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Eduardo Vellasques, Robert Sabourin, Eric Granger |
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Diana Inkpen |
Text Mining in Social Media for Security Threats. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Catherine Cheung, Julio J. Valdés, Jobin Puthuparampil |
Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Francesco Flammini, Stefano Marrone 0001, Nicola Mazzocca, Valeria Vittorini |
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Marco Cococcioni |
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Julio J. Valdés, Fawaz A. Alsulaiman, Abdulmotaleb El-Saddik |
Visualization of Handwritten Signatures Based on Haptic Information. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Gonzalo Nápoles, Isel Grau, Rafael Falcon, Rafael Bello 0001, Koen Vanhoof |
A Granular Intrusion Detection System Using Rough Cognitive Networks. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Paloma de las Cuevas, Zeineb Chelly, Antonio Miguel Mora, Juan Julián Merelo Guervós, Anna Isabel Esparcia-Alcázar |
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti |
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Boris Kovalerchuk, Leonid I. Perlovsky |
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Shawn Eastwood, Svetlana N. Yanushkevich |
Risk Assessment in Authentication Machines. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Bindu Madhavi Padmanabhuni, Kartick Subramanian, Suresh Sundaram 0002 |
Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu |
Classification-Driven Video Analytics for Critical Infrastructure Protection. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | D. Vijay Rao |
Design and Development of Intelligent Military Training Systems and Wargames. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Fátima Barceló-Rico, Anna Isabel Esparcia-Alcázar, Antonio Villalón-Huerta |
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Mark G. Ball, Blerim Qela, Slawomir Wesolkowski |
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | David Bissessar, Carlisle Adams, Alex Stoianov |
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Stuart H. Rubin, Thouraya Bouabana-Tebibel |
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Timothy C. Havens, Derek T. Anderson, Kevin E. Stone, John Becker, Anthony J. Pinar |
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Francesca De Simio, Marco Tesei, Roberto Setola |
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Jillian Morgan, Nur Zincir-Heywood, John T. Jacobs |
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Kun Wang 0009, Eleni Petraki, Hussein A. Abbass |
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Sansanee Auephanwiriyakul, Yutthana Munklang, Nipon Theera-Umpon |
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Ivan Jordanov, Nedyalko Petrov |
Intelligent Radar Signal Recognition and Classification. |
Recent Advances in Computational Intelligence in Defense and Security |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Gabriel Jakobson |
Mission Resilience. |
Cyber Defense and Situational Awareness |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 7090 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|