The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for warfare with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1988 (15) 1989-1995 (15) 1996-1998 (21) 1999-2000 (24) 2001 (21) 2002 (19) 2003 (20) 2004-2005 (86) 2006 (29) 2007 (31) 2008 (22) 2009 (20) 2010 (26) 2011 (15) 2012 (80) 2013 (20) 2014 (37) 2015 (81) 2016 (31) 2017 (19) 2018 (32) 2019 (23) 2020 (25) 2021 (15) 2022 (23) 2023 (29) 2024 (8)
Publication types (Num. hits)
article(239) book(7) incollection(52) inproceedings(481) phdthesis(4) proceedings(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 225 occurrences of 194 keywords

Results
Found 787 publication records. Showing 787 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Ang Yang, Hussein A. Abbass, Ruhul A. Sarker WISDOM-II: A Network Centric Model for Warfare. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
78Yunxiang Ling, Xiangning Shi, Wenyuan Wang SimGrid-HLA - Simulation Grid prototype Oriented to Evaluation of Warfare Performance. Search on Bibsonomy SKG The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SimGrid, evaluation of warfare performance, prototype, federate, HLA/RTI
78Yunxiang Ling, Miao Zhang, Xiaojun Lu, Wenyuan Wang, Songyang Lao Model Searching Algorithm Based on Response Order and Access Order in War-Game Simulation Grid. Search on Bibsonomy Edutainment The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
65Maksim Tsvetovat, Maciej Latek Dynamics of Agent Organizations: Application to Modeling Irregular Warfare. Search on Bibsonomy MABS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Terrorist Networks, Irregular Warfare, Social Network Analysis, Organizational Learning, Multiagent Simulation, Dynamic Social Networks
65Mark Adkins, John Kruse, Robert Younger Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collaboration, ubiquitous computing, situation awareness, network centric warfare
65Marion G. Cerut Mobile Agents in Network-Centric Warfare. Search on Bibsonomy ISADS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF heterogeneous distributed information systems, Internet, communications, mobile agents, Command and control, intelligence, network-centric warfare
65Carmine A. Vaccarino, George Konomos Real-Time Simulation For Verification Of Tactical Electronic Warfare System. Search on Bibsonomy ACM Annual Conference (1) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF Electronic warfare, Operational flight program, Verification, Real-time simulation
61Gianluca Baldassarre Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
61Allen Ott, Alex Moir, John T. Rickard A Game Theoretic Engine for Cyber Warfare. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
61Jared Holsopple, Shanchieh Jay Yang, Moises Sudit Mission Impact Assessment for Cyber Warfare. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
61Robert J. Elder, Alexander H. Levis, Bahram Yousefi Alternatives to Cyber Warfare: Deterrence and Assurance. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
52James Walden A real-time information warfare exercise on a virtual network. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF capture the flag, network security, virtual machine, computer security, laboratory, exercise, user-mode linux, information warfare
52Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein Surviving information warfare attacks on databases. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency
52Sung-Do Chi, Yong-Jun You, Chan-Ho Jung, Jang-Se Lee, Jae-Ick Kim FAMES: fully agent-based modeling & emergent simulation. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  BibTeX  RDF FAMES, SES/MB, battleship agent, modeling and simulation, agent-based
44Henrik Bliddal CBRN Terrorism and the Challenge of Daesh. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Alessandro Niglia, Carlos Veraza Building Resilience Through Social Media After an Attack on Critical Infrastructure. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli Critical Infrastructure Protection: Smart Grids. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Edoardo Camilli OSINT, Big Data & Critical Infrastructures Protection (CIP). Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Elina Lange Ionatamishvili, Sanda Svetoka Strategic Communications and Social Media in the Russia-Ukraine Conflict. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Anke Schmidt-Felzmann "Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Ben Hiller Cyber Security and CIP: A Potential Role for OSCE. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Antonia Colibasanu NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Liviu Lazar NATO Dialogue with the Defence and Security Industry in the Context of the Hybrid Threats. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Gianni Cuozzo Critical Infrastructure Cyber-Attack Through Firmware Exploitation. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Mikael Tofvesson Identifying and Countering Information Influence Activities Using a Comprehensive Society Approach. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Daniel S. Hamilton Going Beyond Static Understandings: Resilience Must Be Shared, and It Must Be Projected Forward. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Mark Rhinard, Bengt Sundelius Stronger Together: Enhancing Cooperation Capacity for Forward Resilience. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Drazen Zgaljic, Paola Badurina-Tomic, Matej Plenca The Importance of Port Security System in the Implementation of Transport Modal-Shift. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
44Robin Wikström, József Mezei Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Oleg Chertov, Dan Tavrov Microfiles as a Potential Source of Confidential Information Leakage. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu 0005 Cyber Insider Mission Detection for Situation Awareness. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Dan E. Tamir, Naphtali David Rishe, Mark Last, Abraham Kandel Soft Computing Based Epidemical Crisis Prediction. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Gulshan Kumar, Krishan Kumar 0001 A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44James Llinas Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Fei-Yue Wang 0001, Xiaochen Li, Wenji Mao An ACP-Based Approach to Intelligence and Security Informatics. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Charles LeDoux, Arun Lakhotia Malware and Machine Learning. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Daniel Ortiz Arroyo Decision Support in Open Source Intelligence. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Suchitra Abel Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Napoleon C. Paxton, Stephen Russell 0001, Ira S. Moskowitz, Paul Hyden A Survey of Community Detection Algorithms Based On Analysis-Intent. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Tudor Dumitras Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Patrick Sweeney, George Cybenko Identifying and Exploiting the Cyber High Ground for Botnets. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons Cyber Attribution: An Argumentation-Based Approach. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Sanjay Goel, Yuan Hong Cyber War Games: Strategic Jostling Among Traditional Adversaries. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Noam Ben-Asher, Cleotilde Gonzalez CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Christopher Kiekintveld, Viliam Lisý, Radek Píbil Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44B. Aditya Prakash Graph Mining for Cyber Security. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Rami Puzis, Yuval Elovici Active Discovery of Hidden Profiles in Social Networks Using Malware. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Samuel N. Hamilton Automated Adversary Profiling. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Kristin E. Heckman, Frank J. Stech Cyber Counterdeception: How to Detect Denial & Deception (D&D). Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Julie L. Marble, William F. Lawless, Ranjeev Mittu, Joseph T. Coyne, Myriam Abramson, Ciara Sibley The Human Factor in Cybersecurity: Robust & Intelligent Defense. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Ehab Al-Shaer, Mohammad Ashiqur Rahman Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Andrew Ruef, Chris Rohlf Programming Language Theoretic Security in the Real World: A Mirage or the Future? Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
43Xiaohui Cui, Thomas E. Potok A Particle Swarm Social Model for Multi-Agent Based Insurgency Warfare Simulation. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Ang Yang, Hussein A. Abbass, Ruhul A. Sarker Evolving agents for network centric warfare. Search on Bibsonomy GECCO Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network theory, multi-agent systems, complex adaptive systems
43Xiaofei Wang, Yunqiu Chen Web-oriented Warfare Command Decision Support System Based on Agent and Data Warehouse. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43George F. Stone III, Gregory A. McIntyre JWARS: the joint warfare system (JWARS): a modeling and analysis tool for the defense department. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Yong-Woon Moon, Hae-Sun Jung, Chang-Sung Jeong Context-awareness in Battlefield using Ubiquitous Computing: Network Centric Warfare. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Military Operation, Ubiquitous Computing, Middleware, Context-awareness, Network Centric Warfare
39Saurabh Mukherjee, Shashikala Tapaswi Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Virtual warfare, Dedicated virtual reality system software, Virtual reality
39Brajendra Panda, Joseph Giordano An overview of post information warfare data recovery. Search on Bibsonomy SAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF recovery, data dependency, damage assessment, information warfare
35Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
35J. S. Keane, Jerzy W. Rozenblit, Michael Barnes The Advanced Battlefield Architecture for Tactical Information Selection (ABATIS). Search on Bibsonomy ECBS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Advanced Battlefield Architecture for Tactical Information Selection, warfare, display strategy testing, hierarchical design methodology, object-oriented design methodology, battlefield visualization, process centered display, display layer, object-oriented methods, class diagrams, object modeling technique
35Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
35John P. McDermott, R. Gelinas, S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare
34Zhigang Wang, Biao Liu, Xingang Cui, Yibo Li, Yongwen Yang, Zhichao Lyu The Application of Micro Coaxial Rotorcraft in Warfare: An Overview, Key Technologies, and Warfare Scenarios. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Marthie Grobler, Ignus P. Swart On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain. Search on Bibsonomy HCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
34Murdoch Watney Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. Search on Bibsonomy ICDF2C The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
34Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung Cyber military strategy for cyberspace superiority in cyber warfare. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Xiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, Georgi M. Dimirovski Effectiveness evaluation of warfare command systems with dissymmetrical warfare information. Search on Bibsonomy ACC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
34Kedar Sambhoos, James Llinas Evaluation methods for distributed multi-platform systems in electronic warfare and information-warfare related missions. Search on Bibsonomy FUSION The full citation details ... 2009 DBLP  BibTeX  RDF
34Samuel Liles Cyber warfare compared to fourth and fifth generation warfare as applied to the Internet. Search on Bibsonomy ISTAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Tara Leweling, Ron Walters The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
34Ken Webb Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
34Geoffrey Darnton Content Analysis as a Tool of Information Warfare. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
34Chester L. Smith Reply by Chester Smith [9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith]. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Avishag Gordon 9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Samuel N. Hamilton, Wendy L. Hamilton Adversary Modeling and Simulation in Cyber Warfare. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Doo-Yeoun Cho, Myeong-Jo Son, Jung-Ho Kang, Sung-Jun Lee, Ju-Hwan Cha, Seong-Jin Yoo, Hyo-Kwang Lee, Kyu-Yeul Lee, Tae Wan Kim, Yong-Seog Ko Analysis of a submarine's evasive capability against an antisubmarine warfare torpedo using DEVS modeling and simulation. Search on Bibsonomy SpringSim (2) The full citation details ... 2007 DBLP  BibTeX  RDF evasive capability, simulation based acquisition (SBA), submarine, unified modeling language (UML), DEVS formalism
30Darren Baker Advances in Communications Electronic Warfare. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Jun-feng Song, Weiming Zhang 0003, Weidong Xiao, Zhen-ning Xu Study on Construction and Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for Network Centric Warfare. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Gaoming Huang, Luxi Yang, Zhenya He Time-delay direction finding based on canonical correlation analysis [electronic warfare applications]. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30John Kruse, Mark Adkins, Kimberly A. Holloman Network Centric Warfare in the U.S. Navy's Fifth Fleet. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Joshua Sinai Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Martin Fredriksson, Rune Gustavsson Quality of Service in Network-Centric Warfare and Challenges in Open Computational Systems Engineering. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Terence Robinson Simulation in support of military operations, tactics, and planning: ODIN: an underwater warfare simulation environment. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue Agent-based Simulation Approach to Information Warfare in the SEAS Environment. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Pan Shi, Yifeng Lian Game-Theoretical Effectiveness Evaluation of DDoS Defense. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF effectiveness evaluation, Game Theory, congestion control, DDoS
26Daniel P. Jenkins, Neville A. Stanton, Paul M. Salmon, Guy H. Walker, Mark S. Young, Ian R. Whitworth, Andy Farmilo, Geoffrey Hone The Development of a Cognitive Work Analysis Tool. Search on Bibsonomy HCI (13) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software Development, Training, Tools, Cognitive Work Analysis
26Yang Hu, Chen Hang A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulation. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Xiong Li, Sheng Dang Tactical Battlefield Entities Simulation Model Based on Multi-agent Interactions. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-agent system, interactions, agent, modeling and simulation
26David P. Biros, Kent Marett, Brent T. Langhals Vigilance and Error Detection in an Automated Command and Control Environment. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Shen Zhihe, Liu Feng Applying Improved BP Neural Network In Underwater Targets Recognition. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Vishal Vatsa, Shamik Sural, Arun K. Majumdar A Game-Theoretic Approach to Credit Card Fraud Detection. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26O. Sami Saydjari Defending Cyberspace. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Martin Fredriksson, Rune Gustavsson Methodological principles in construction and observation of open computational systems. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF scalability and complexity issues, multiagent systems, methodologies and tools
26Kenneth Y. Jo Satellite communications representation in network simulation. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Brent Heeringa, Paul R. Cohen An underlying model for defeat mechanisms. Search on Bibsonomy WSC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Stephanie M. White, Michael Edwards Domain Engineering: The Challenge, Status, and Trends. Search on Bibsonomy ECBS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF reuse, systems engineering, product lines, Domain engineering, business strategy, system families
26Mark A. Woyna, John H. Christiansen, Christopher W. Hield, Kathy Lee Simunich Modeling Battlefield Sensor Environments with an Object Database Management System. Search on Bibsonomy SIGMOD Conference The full citation details ... 1993 DBLP  DOI  BibTeX  RDF C++, SQL
22Zhanshan (Sam) Ma Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. Search on Bibsonomy AICI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis
22Mariusz Chmielewski Ontology Applications for Achieving Situation Awareness in Military Decision Support Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Military operations, ontology, decision support, situation awareness, semantic models, Network Centric Warfare
Displaying result #1 - #100 of 787 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license