


default search action
CISDA 2009: Ottawa, Canada
- 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Ottawa, Canada, July 8-10, 2009. IEEE 2009, ISBN 978-1-4244-3764-1

Special Session - Complex Adaptive Systems 1
- Irene Pestov, Simona Verga:

Dynamical networks as a tool for system analysis and exploration. 1-8 - Jana Diesner, Kathleen M. Carley

:
He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis. 1-8 - Trevor Martin, Yun Shen:

mTRACK - Monitoring time-varying relations in approximately categorised knowledge. 1-8 - Anthony Stirtzinger, Craig S. Anken, Bruce McQueary:

Goal-driven semi-automated generation of semantic models. 1-7 - Terrill L. Frantz, Kathleen M. Carley:

Information assurances and threat identification in networked organizations. 1-5
Special Session - Adaptive Network Security and Management 1
- Safaa Zaman, Fakhri Karray:

Collaborative architecture for distributed intrusion detection system. 1-7 - Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis

:
Detection of slow malicious worms using multi-sensor data fusion. 1-9 - Mahbod Tavallaee, Ebrahim Bagheri

, Wei Lu
, Ali A. Ghorbani:
A detailed analysis of the KDD CUP 99 data set. 1-6 - Anna T. Lawniczak

, Bruno N. Di Stefano
, Hao Wu:
Detection & study of DDoS attacks via entropy in data network models. 1-8 - Carson Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji:

Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT. 1-7
Special Session - Complex Adaptive Systems 2
- Ruibiao J. Guo, Brad Cain:

Integrating reasoning with personality effects in simulated operators. 1-8 - Zeeshan-ul-hassan Usmani, Fawzi A. Alghamdi, Daniel Kirk:

BlastSim - Multi agent simulation of suicide bombing. 1-8 - Il-Chul Moon:

Simulation analysis on destabilization of complex adaptive organizations. 1-8 - Dragos Calitoiu:

New search algorithm for randomly located objects: A non-cooperative agent based approach. 1-6
Special Session - Computational Intelligence for Unmanned Aerial Vehicles 1
- Robert J. Mullen, Dorothy Ndedi Monekosso

, Sarah A. Barman
, Paolo Remagnino:
Autonomous control laws for mobile robotic surveillance swarms. 1-6 - Gilles Labonté:

Canadian artic Sovereignty: Local intervention by flocking UAVs. 1-8 - P. B. Sujit, João Borges de Sousa

, Fernando M. Lobo Pereira
:
Multiple UAV teams for multiple tasks. 1-8
Sensor Networks, Tracking and Radar
- David Akselrod, Ratnasingham Tharmarasa, Thia Kirubarajan, Zhen Ding, Tony Ponsford:

Multisensor-multitarget tracking testbed. 1-6 - Ratnasingham Tharmarasa, Thia Kirubarajan, Michael McDonald:

Passive multitarget tracking using transmitters of opportunity. 1-8 - Ratnasingham Tharmarasa, Thia Kirubarajan, Thomas Lang:

Joint path planning and sensor subset selection for multistatic sensor networks. 1-8 - Derek Elsaesser:

Emitter geolocation using low-accuracy direction-finding sensors. 1-7 - Zhen Ding, Henry Leung:

Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network. 1-5
Special Session - Computational Intelligence in Unmanned Aerial Vehicles 2
- Suresh Suresh:

Adaptive neural flight control system for helicopter. 1-8 - Hai-Jun Rong, Narasimhan Sundararajan:

Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failures. 1-8 - Peter Sarunic, Robin J. Evans

, William Moran:
Control of unmanned aerial vehicles for passive detection and tracking of multiple emitters. 1-7 - Suresh Sundaram, Hai-Jun Rong, Narasimhan Sundararajan:

Bio-inspired computing for launch vehicle design and trajectory optimization. 1-8
Special Session - Military Logistics
- Michael Mazurek

, Slawomir Wesolkowski:
Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm. 1-7 - Ahmed Ghanmi, Alain Martel, Jean Berger, Abdeslem Boukhtouta:

A framework for the design of a military operational supply network. 1-9 - Bohdan Kaluzny, R. H. A. David Shaw, Ahmed Ghanmi, Beomjoon Kim:

An optimisation model for airlift load planning: Galahad and the quest for the 'holy grail'. 1-8 - Tom Flanagan, Chris Thornton, Jörg Denzinger

:
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior. 1-8
Localization, Tracking and Biometrics
- Jason P. Rhinelander

, Peter X. Liu:
Tracking a moving hypothesis for visual data with explicit switch detection. 1-8 - Andres Solis Montero, Amiya Nayak

, Milos Stojmenovic, Nejib Zaguia:
Robust line extraction based on repeated segment directions on image contours. 1-7 - Dmitri Ignakov, Galina Okouneva, Guangjun Liu:

Localization of door handle using a single camera on a door opening mobile manipulator. 1-7 - Rimon Elias

, Amal Elnahas:
Fast localization in indoor environments. 1-6 - Ruggero Donida Labati

, Vincenzo Piuri, Fabio Scotti
:
Neural-based iterative approach for iris detection in iris recognition systems. 1-6
Special Session - Adaptive Network Security and Management 2
- Antonio Trifilo, Stefan Burschka, Ernst W. Biersack:

Traffic to protocol reverse engineering. 1-8 - Hilmi Günes Kayacik, Nur Zincir-Heywood

, Malcolm I. Heywood
, Stefan Burschka:
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing. 1-8 - Wael Khreich

, Eric Granger
, Ali Miri, Robert Sabourin:
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection. 1-8 - Patrick LaRoche, Nur Zincir-Heywood

, Malcolm I. Heywood
:
Evolving TCP/IP packets: A case study of port scans. 1-8 - Riyad Alshammari, Nur Zincir-Heywood

:
Machine learning based encrypted traffic classification: Identifying SSH and Skype. 1-8 - Saeed Samet

, Ali Miri:
Secure two and multi-party association rule mining. 1-6
Special Session - Applied Computational Intelligence in Biometrics
- Jean-François Connolly, Eric Granger

, Robert Sabourin:
Incremental adaptation of fuzzy ARTMAP neural networks for video-based face classification. 1-8 - Amioy Kumar, Madasu Hanmandlu, H. M. Gupta:

Online biometric authentication using hand vein patterns. 1-7 - Dmitry O. Gorodnichy:

Evolution and evaluation of biometric systems. 1-8 - Ehsan Fazl Ersi

, John K. Tsotsos
:
Local feature analysis for robust face recognition. 1-6 - Fawaz A. Alsulaiman

, Nizar Sakr, Julio J. Valdés, Abdulmotaleb El-Saddik
, Nicolas D. Georganas:
Feature selection and classification in genetic programming: Application to haptic-based biometric data. 1-7 - Krzysztof Slot

, Jaroslaw Cichosz, Lukasz Bronakowski:
Application of voiced-speech variability descriptors to emotion recognition. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














