


default search action
Recent Advances in Computational Intelligence in Defense and Security 2016
- Rami S. Abielmona, Rafael Falcon, Nur Zincir-Heywood

, Hussein A. Abbass
:
Recent Advances in Computational Intelligence in Defense and Security. Studies in Computational Intelligence 621, Springer 2016, ISBN 978-3-319-26448-6 - Recent Advances in Computational Intelligence in Defense and Security. 1-9

Physical Security and Surveillance
- Timothy C. Havens, Derek T. Anderson, Kevin E. Stone, John Becker, Anthony J. Pinar:

Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection. 13-44 - Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu:

Classification-Driven Video Analytics for Critical Infrastructure Protection. 45-69 - Francesco Flammini

, Stefano Marrone
, Nicola Mazzocca
, Valeria Vittorini:
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring. 71-100 - Ivan Jordanov

, Nedyalko Petrov:
Intelligent Radar Signal Recognition and Classification. 101-135
Cyber Security and Intrusion Detection Systems
- Paloma de las Cuevas, Zeineb Chelly

, Antonio Miguel Mora, Juan Julián Merelo Guervós
, Anna Isabel Esparcia-Alcázar:
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique. 139-167 - Gonzalo Nápoles

, Isel Grau
, Rafael Falcon, Rafael Bello, Koen Vanhoof
:
A Granular Intrusion Detection System Using Rough Cognitive Networks. 169-191 - Stuart H. Rubin, Thouraya Bouabana-Tebibel:

NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies. 193-223 - Fátima Barceló-Rico, Anna Isabel Esparcia-Alcázar, Antonio Villalón-Huerta

:
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats. 225-248 - Jillian Morgan, Nur Zincir-Heywood

, John T. Jacobs:
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. 249-273
Biometric Security and Authentication Systems
- Julio J. Valdés, Fawaz A. Alsulaiman

, Abdulmotaleb El-Saddik
:
Visualization of Handwritten Signatures Based on Haptic Information. 277-307 - Bindu Madhavi Padmanabhuni, Kartick Subramanian, Suresh Sundaram:

Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification. 309-338 - David Bissessar, Carlisle Adams, Alex Stoianov:

Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. 339-366 - Eduardo Vellasques, Robert Sabourin, Eric Granger

:
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems. 367-389 - Shawn Eastwood, Svetlana N. Yanushkevich

:
Risk Assessment in Authentication Machines. 391-420
Situational Awareness and Threat Assessment
- Francesca De Simio, Marco Tesei, Roberto Setola:

Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework. 423-444 - Marco Cococcioni

:
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification. 445-465 - Sansanee Auephanwiriyakul

, Yutthana Munklang, Nipon Theera-Umpon
:
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features. 467-489 - Diana Inkpen:

Text Mining in Social Media for Security Threats. 491-517 - Parvez Faruki, Shweta Bhandari

, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti
:
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. 519-552
Strategic/Mission Planning and Resource Management
- D. Vijay Rao:

Design and Development of Intelligent Military Training Systems and Wargames. 555-603 - Catherine Cheung, Julio J. Valdés, Jobin Puthuparampil:

Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques. 605-634 - Kun Wang, Eleni Petraki, Hussein A. Abbass

:
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning. 635-661 - Mark G. Ball, Blerim Qela, Slawomir Wesolkowski:

A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. 663-693 - Boris Kovalerchuk

, Leonid I. Perlovsky:
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models. 695-726 - Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin:

Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. 727-752

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














