Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/cisda:"
@inproceedings{DBLP:conf/cisda/AmannaAFR15, author = {Ashwin E. Amanna and Daniel Ali and David Gonzalez Fitch and Jeffrey H. Reed}, title = {Design of experiments based empirical models to support cognitive radio decision making}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208627}, doi = {10.1109/CISDA.2015.7208627}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AmannaAFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AndersonD15, author = {Gustave Anderson and David J. Dorsey}, title = {Ternary trust metric for mobile ad-hoc networks}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208633}, doi = {10.1109/CISDA.2015.7208633}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AndersonD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AvvariSMZNPH15, author = {Gopi Vinod Avvari and David Sidoti and Manisha Mishra and Lingyi Zhang and Bala Kishore Nadella and Krishna R. Pattipati and James A. Hansen}, title = {Dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environment}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208622}, doi = {10.1109/CISDA.2015.7208622}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AvvariSMZNPH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BalasingamPLR15, author = {Balakumar Balasingam and Krishna R. Pattipati and Georgiy M. Levchuk and John C. Romano}, title = {Robust collaborative learning by multi-agents}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208646}, doi = {10.1109/CISDA.2015.7208646}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BalasingamPLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BalkanliZ15, author = {Eray Balkanli and Nur Zincir{-}Heywood}, title = {Highlights on analyzing one-way traffic using different tools}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208635}, doi = {10.1109/CISDA.2015.7208635}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/BalkanliZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DaneshZWMTY15, author = {Wafi Danesh and Chenyuan Zhao and Bryant T. Wysocki and Michael J. Medley and Ngwe Thawdar and Yang Yi}, title = {Channel estimation in wireless {OFDM} systems using reservoir computing}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208638}, doi = {10.1109/CISDA.2015.7208638}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DaneshZWMTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DonahueMSDOKW15, author = {Colin Donahue and Cory E. Merkel and Qutaiba Saleh and Levs Dolgovs and Yu Kee Ooi and Dhireesha Kudithipudi and Bryant T. Wysocki}, title = {Design and analysis of neuromemristive echo state networks with limited-precision synapses}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208623}, doi = {10.1109/CISDA.2015.7208623}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DonahueMSDOKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GoudarziSS15, author = {Alireza Goudarzi and Alireza Shabani and Darko Stefanovic}, title = {Exploring transfer function nonlinearity in echo state networks}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208637}, doi = {10.1109/CISDA.2015.7208637}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GoudarziSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/JagannathSD15, author = {Jithin Jagannath and Hanne M. Saarinen and Andrew L. Drozd}, title = {Framework for automatic signal classification techniques {(FACT)} for software defined radios}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208628}, doi = {10.1109/CISDA.2015.7208628}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/JagannathSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KaneB15, author = {Matthew Kane and Daniel Bennett}, title = {Detecting Push to Talk radios using two tone intermodulation distortion}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208629}, doi = {10.1109/CISDA.2015.7208629}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KaneB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KovalerchukP15, author = {Boris Kovalerchuk and Leonid I. Perlovsky}, title = {Rigorous sensor resource management: Methodology and evolutionary optimization}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208621}, doi = {10.1109/CISDA.2015.7208621}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KovalerchukP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LevchukB15, author = {Georgiy Levchuk and Erik Blasch}, title = {Probabilistic graphical models for multi-source fusion from text sources}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208640}, doi = {10.1109/CISDA.2015.7208640}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LevchukB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LiLYYSLCZWJ15, author = {Hai (Helen) Li and Chenchen Liu and Bonan Yan and Chaofei Yang and Linghao Song and Zheng Li and Yiran Chen and Weijie Zhu and Qing Wu and Hao Jiang}, title = {Spiking-based matrix computation by leveraging memristor crossbar array}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208626}, doi = {10.1109/CISDA.2015.7208626}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LiLYYSLCZWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Liu15, author = {Ziqian Liu}, title = {Risk sensitive optimal synchronization of coupled stochastic neural networks with chaotic phenomena}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208632}, doi = {10.1109/CISDA.2015.7208632}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LoeMD15, author = {Richard Loe and Christopher Maracchion and Andrew L. Drozd}, title = {Semi-autonomous management of multiple ad-hoc teams of UAVs}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208620}, doi = {10.1109/CISDA.2015.7208620}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LoeMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ManemBXCGC15, author = {Harika Manem and Karsten Beckmann and Min Xu and Robert Carroll and Robert E. Geer and Nathaniel C. Cady}, title = {An extendable multi-purpose 3D neuromorphic fabric using nanoscale memristors}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208625}, doi = {10.1109/CISDA.2015.7208625}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ManemBXCGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MiaoHTHDR15, author = {Sheng Miao and Robert J. Hammell II and Ziying Tang and Timothy P. Hanratty and John Dumer and John T. Richardson}, title = {Integrating complementary/contradictory information into fuzzy-based VoI determinations}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208636}, doi = {10.1109/CISDA.2015.7208636}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MiaoHTHDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MurtazaKHG15, author = {Syed Shariyar Murtaza and Wael Khreich and Abdelwahab Hamou{-}Lhadj and St{\'{e}}phane Gagnon}, title = {A trace abstraction approach for host-based anomaly detection}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208644}, doi = {10.1109/CISDA.2015.7208644}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MurtazaKHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NelsonCAKTB15, author = {Kevin Nelson and George Corbin and Mark Anania and Matthew Kovacs and Jeremy Tobias and Misty K. Blowers}, title = {Evaluating model drift in machine learning algorithms}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208643}, doi = {10.1109/CISDA.2015.7208643}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NelsonCAKTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NjillaP15, author = {Laurent Yamen Njilla and Niki Pissinou}, title = {Dynamics of data delivery in mobile ad-hoc networks: {A} bargaining game approach}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208634}, doi = {10.1109/CISDA.2015.7208634}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NjillaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Patel15, author = {Hiren Patel}, title = {Non-parametric feature generation for RF-fingerprinting on ZigBee devices}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208645}, doi = {10.1109/CISDA.2015.7208645}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Patel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ReynoldsCES15, author = {Joshua Reynolds and Lauren A. Christopher and Russ Eberhart and Patrick Shaffer}, title = {Using computational swarm intelligence for real-time asset allocation}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208619}, doi = {10.1109/CISDA.2015.7208619}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ReynoldsCES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/RodriguezKK15, author = {Manuel Rodr{\'{\i}}guez and Kevin A. Kwiat and Charles A. Kamhoua}, title = {On the use of design diversity in fault tolerant and secure systems: {A} qualitative analysis}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208639}, doi = {10.1109/CISDA.2015.7208639}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/RodriguezKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SalehMKW15, author = {Qutaiba Saleh and Cory E. Merkel and Dhireesha Kudithipudi and Bryant T. Wysocki}, title = {Memristive computational architecture of an echo state network for real-time speech-emotion recognition}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208624}, doi = {10.1109/CISDA.2015.7208624}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SalehMKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Schafer15, author = {Carlo Sch{\"{a}}fer}, title = {Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadata}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208641}, doi = {10.1109/CISDA.2015.7208641}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Schafer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Schaffer15, author = {J. David Schaffer}, title = {Evolving spiking neural networks: {A} novel growth algorithm corrects the teacher}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208630}, doi = {10.1109/CISDA.2015.7208630}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Schaffer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhaoDWY15, author = {Chenyuan Zhao and Wafi Danesh and Bryant T. Wysocki and Yang Yi}, title = {Neuromorphic encoding system design with chaos based {CMOS} analog neuron}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208631}, doi = {10.1109/CISDA.2015.7208631}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhaoDWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhaoKKR15, author = {Hong Zhao and Kevin A. Kwiat and Charles A. Kamhoua and Manuel Rodr{\'{\i}}guez}, title = {Applying chaos theory for runtime Hardware Trojan detection}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208642}, doi = {10.1109/CISDA.2015.7208642}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhaoKKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2015, title = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7165058/proceeding}, isbn = {978-1-4673-7557-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Anh14, author = {Nguyen Hoai Anh}, title = {A multi-objective method for discovery of pathways in protein-protein interaction networks}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035631}, doi = {10.1109/CISDA.2014.7035631}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Anh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AvedyanGP14, author = {Eduard Avedyan and Alexander I. Galushkin and Dmitry V. Pantiukhin}, title = {Neural network technologies for information systems security}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035632}, doi = {10.1109/CISDA.2014.7035632}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AvedyanGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Barnabe-LortieB14, author = {Vincent Barnabe{-}Lortie and Colin Bellinger and Nathalie Japkowicz}, title = {Smoothing gamma ray spectra to improve outlier detection}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035633}, doi = {10.1109/CISDA.2014.7035633}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/Barnabe-LortieB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ChimedtserenITK14, author = {Enkhbold Chimedtseren and Keisuke Iwai and Hidema Tanaka and Takakazu Kurokawa}, title = {Intrusion detection system using Discrete Fourier Transform}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035624}, doi = {10.1109/CISDA.2014.7035624}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ChimedtserenITK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ChusilpCN14, author = {Pawat Chusilp and Weerawut Charubhun and Otsin Nilubol}, title = {Effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035622}, doi = {10.1109/CISDA.2014.7035622}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ChusilpCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/CurtisHAP14, author = {Phillip Curtis and Moufid Harb and Rami S. Abielmona and Emil M. Petriu}, title = {Behavior-driven video analytics system for critical infrastructure protection}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035630}, doi = {10.1109/CISDA.2014.7035630}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/CurtisHAP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DangDN14, author = {Thai Thinh Dang and Trong Hai Duong and Hong Son Nguyen}, title = {A hybrid framework for enhancing correlation to solve cold-start problem in recommender systems}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035626}, doi = {10.1109/CISDA.2014.7035626}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DangDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DangKSYN14, author = {Viet{-}Chau Dang and Masao Kubo and Hiroshi Sato and Akihiro Yamaguchi and Akira Namatame}, title = {A simple braking model for detecting incidents locations by smartphones}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035625}, doi = {10.1109/CISDA.2014.7035625}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DangKSYN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DinhTJ14, author = {Quan Dang Dinh and Quang{-}Anh Tran and Frank Jiang}, title = {Automated generation of ham rules for Vietnamese spam filtering}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035628}, doi = {10.1109/CISDA.2014.7035628}, timestamp = {Sat, 08 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DinhTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/FalconABPA14, author = {Rafael Falcon and Rami S. Abielmona and Sean Billings and Alex Plachkov and Hussein A. Abbass}, title = {Risk management with hard-soft data fusion in maritime domain awareness}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035641}, doi = {10.1109/CISDA.2014.7035641}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/FalconABPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/HungN14, author = {Nguyen Manh Hung and Vu Duy Nhat}, title = {B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035643}, doi = {10.1109/CISDA.2014.7035643}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/HungN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KavakebNBYJ14, author = {Shayan Kavakeb and Trung Thanh Nguyen and Mohamed Benmerikhi and Zaili Yang and Ian Jenkinson}, title = {An improved memetic algorithm to enhance the sustainability and reliability of transport in container terminals}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035627}, doi = {10.1109/CISDA.2014.7035627}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/KavakebNBYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LeCNN14, author = {Thi Anh Le and Thi Huong Chu and Quang Uy Nguyen and Xuan Hoai Nguyen}, title = {Malware detection using genetic programming}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035623}, doi = {10.1109/CISDA.2014.7035623}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LeCNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MiahNSG14, author = {Md. Suruz Miah and Bao Nguyen and Davide Spinello and Wail Gueaieb}, title = {Maritime air defence firing tactics}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--9}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035639}, doi = {10.1109/CISDA.2014.7035639}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MiahNSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Nguyen14, author = {Ngoc Tran Nguyen}, title = {An efficient LBP-based descriptor for real-time object detection}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035635}, doi = {10.1109/CISDA.2014.7035635}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Nguyen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NguyenDN14, author = {Mau Uyen Nguyen and Thanh Tinh Dao and Long Thanh Ngo}, title = {A fuzzy-based approach for approximating depth information in {RGB-D} images}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035636}, doi = {10.1109/CISDA.2014.7035636}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NguyenDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NguyenM14, author = {Bao Nguyen and Md. Suruz Miah}, title = {Analysis of maritime air defence scenarios}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035638}, doi = {10.1109/CISDA.2014.7035638}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NguyenM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NguyenTB14, author = {Long Nguyen and Anh Quang Tran and Lam Thu Bui}, title = {{DMEA-II} and its application on spam email detection problems}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035634}, doi = {10.1109/CISDA.2014.7035634}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/NguyenTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NhuongNTPD14, author = {Nguyen Van Nhuong and Vo Thi Yen Nhi and Cam Nguyen Tan and Phu Xuan Mai and Tan Cao Dang}, title = {SSSM-semantic set and string matching based malware detection}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035642}, doi = {10.1109/CISDA.2014.7035642}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/NhuongNTPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PetrakiA14, author = {Eleni Petraki and Hussein A. Abbass}, title = {On trust and influence: {A} computational red teaming game theoretic perspective}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035644}, doi = {10.1109/CISDA.2014.7035644}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PetrakiA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PhanS14, author = {Dung H. Phan and Junichi Suzuki}, title = {{R2-BEAN:} {R2} indicator based evolutionary algorithm for noisy multiobjective optimization}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035637}, doi = {10.1109/CISDA.2014.7035637}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PhanS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TinhTDA14, author = {Cao Huu Tinh and Vu Hoa Tien and Nguyen Cong Dinh and Ngoc Anh Mai}, title = {Design of Takagi-Sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jet}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035629}, doi = {10.1109/CISDA.2014.7035629}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TinhTDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TranNWJ14, author = {Hoang Anh Q. Tran and Akira Namatame and Augie Widyotriatmo and Endra Joelianto}, title = {An optimization procedure for enhancing network robustness against cascading failures}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035645}, doi = {10.1109/CISDA.2014.7035645}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TranNWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TrinhOA14, author = {Minh Hoang Trinh and Kwang{-}Kyo Oh and Hyo{-}Sung Ahn}, title = {Control of a mobile agent using only bearing measurements in triangular region}, booktitle = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISDA.2014.7035640}, doi = {10.1109/CISDA.2014.7035640}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TrinhOA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2014, title = {Seventh {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December 14-17, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7010459/proceeding}, isbn = {978-1-4799-5431-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AraujoSS13, author = {J. F. Araujo and P. B. Sujit and Jo{\~{a}}o B. Sousa}, title = {Multiple {UAV} area decomposition and coverage}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {30--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595424}, doi = {10.1109/CISDA.2013.6595424}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AraujoSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AruneshwaranSWV13, author = {R. Aruneshwaran and Suresh Sundaram and Jianliang Wang and T. K. Venugopalan}, title = {Neural adaptive flight controller for ducted-fan {UAV} performing nonlinear maneuver}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {51--56}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595427}, doi = {10.1109/CISDA.2013.6595427}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AruneshwaranSWV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BallingerL13, author = {Christopher A. Ballinger and Sushil J. Louis}, title = {Comparing heuristic search methods for finding effective real-time strategy game plans}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {16--22}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595422}, doi = {10.1109/CISDA.2013.6595422}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BallingerL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ForoushaniZ13, author = {Vahid Aghaei Foroushani and Nur Zincir{-}Heywood}, title = {Investigating application behavior in network traffic traces}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {72--79}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595430}, doi = {10.1109/CISDA.2013.6595430}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/ForoushaniZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GaoJNTP13, author = {Mingsheng Gao and Jun Jiang and Kien Ming Ng and Kwong Meng Teo and Kim{-}Leng Poh}, title = {Cooperative path planning for UAVs with {UAV} loss considerations}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {38--44}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595425}, doi = {10.1109/CISDA.2013.6595425}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/GaoJNTP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/HohzakiMT13, author = {Ryusuke Hohzaki and Syuhei Morita and Yoshiharu Terashima}, title = {A patrol problem in a building by search theory}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {104--111}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595434}, doi = {10.1109/CISDA.2013.6595434}, timestamp = {Mon, 04 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/HohzakiMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/HuLCWR13, author = {Miao Hu and Hai Li and Yiran Chen and Qing Wu and Garrett S. Rose}, title = {{BSB} training scheme implementation on memristor-based circuit}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {80--87}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595431}, doi = {10.1109/CISDA.2013.6595431}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/HuLCWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/IsmailPAS13, author = {Shaik Ismail and Abhay A. Pashilkar and Ramakalyan Ayyagari and N. Sundararajan}, title = {Improved autolanding controller for aircraft encountering unknown actuator failures}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {96--103}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595433}, doi = {10.1109/CISDA.2013.6595433}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/IsmailPAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MallikS13, author = {Galib R. Mallik and Arpita Sinha}, title = {A novel obstacle avoidance control algorithm in a dynamic environment}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {57--63}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595428}, doi = {10.1109/CISDA.2013.6595428}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MallikS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/OberbergerLN13, author = {Michael Oberberger and Sushil J. Louis and Monica N. Nicolescu}, title = {Evolving team tactics using potential fields}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595420}, doi = {10.1109/CISDA.2013.6595420}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/OberbergerLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PashilkarIAS13, author = {Abhay A. Pashilkar and Shaik Ismail and Ramakalyan Ayyagari and Narasimhan Sundararajan}, title = {Design of a nonlinear dynamic inversion controller for trajectory following and maneuvering for fixed wing aircraft}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {64--71}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595429}, doi = {10.1109/CISDA.2013.6595429}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PashilkarIAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/RastegariHLB13, author = {Samaneh Rastegari and Philip Hingston and Chiou Peng Lam and M. Brand}, title = {Testing a distributed denial of service defence mechanism using red teaming}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {23--29}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595423}, doi = {10.1109/CISDA.2013.6595423}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/RastegariHLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SenthilnathOMK13, author = {J. Senthilnath and S. N. Omkar and V. Mani and Anurag R. Katti}, title = {Cooperative communication of {UAV} to perform multi-task using nature inspired techniques}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {45--50}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595426}, doi = {10.1109/CISDA.2013.6595426}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SenthilnathOMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ShridharanKP13, author = {S. Shridharan and R. Kumar and S. K. Pundir}, title = {Positioning of military combat units through weight-based terrain analysis using {NASA} World Wind}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {9--15}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595421}, doi = {10.1109/CISDA.2013.6595421}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ShridharanKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TambouratzisCP13, author = {Tatiana Tambouratzis and Dina Chernikova and Imre P{\'{a}}zsit}, title = {A comparison of artificial neural network performance: The case of neutron/gamma pulse shape discrimination}, booktitle = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, pages = {88--95}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CISDA.2013.6595432}, doi = {10.1109/CISDA.2013.6595432}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/TambouratzisCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2013, title = {2013 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6588670/proceeding}, isbn = {978-1-4673-5911-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Abramson12, author = {Myriam Abramson}, title = {Toward the attribution of Web behavior}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291524}, doi = {10.1109/CISDA.2012.6291524}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Abramson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AlmagambetovCV12, author = {Akhan Almagambetov and Mauricio Casares and Senem Velipasalar}, title = {Autonomous tracking of vehicle rear lights and detection of brakes and turn signals}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291543}, doi = {10.1109/CISDA.2012.6291543}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AlmagambetovCV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AlsulaimanVE12, author = {Fawaz A. Alsulaiman and Julio J. Vald{\'{e}}s and Abdulmotaleb El{-}Saddik}, title = {Identity verification based on haptic handwritten signatures: Genetic programming with unbalanced data}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291531}, doi = {10.1109/CISDA.2012.6291531}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/AlsulaimanVE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AndersonSSK12, author = {Derek T. Anderson and Ozy Sjahputera and Kevin E. Stone and James M. Keller}, title = {Causal cueing system for above ground anomaly detection of explosive hazards using support vector machine localized by K-nearest neighbor}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291519}, doi = {10.1109/CISDA.2012.6291519}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AndersonSSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BissessarGST12, author = {David Bissessar and Dmitry O. Gorodnichy and Alex Stoianov and Michael Thieme}, title = {Assessment of privacy enhancing technologies for biometrics}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291517}, doi = {10.1109/CISDA.2012.6291517}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BissessarGST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Blouin12, author = {St{\'{e}}phane Blouin}, title = {Managing data latency for consensus over dynamic sensor-networks}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291518}, doi = {10.1109/CISDA.2012.6291518}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/Blouin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/CaiLG12, author = {Zixing Cai and Yi Li and Mingqin Gu}, title = {Real-time recognition system of traffic light in urban environment}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291516}, doi = {10.1109/CISDA.2012.6291516}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/CaiLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/CarpuatGI12, author = {Marine Carpuat and Cyril Goutte and Pierre Isabelle}, title = {Filtering and routing multilingual documents for translation}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291536}, doi = {10.1109/CISDA.2012.6291536}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/CarpuatGI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/CheungW12, author = {Pak{-}Ming Cheung and Kam{-}Tim Woo}, title = {MCMC-based human tracking with stereo cameras under frequent interaction and occlusion}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291515}, doi = {10.1109/CISDA.2012.6291515}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/CheungW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DandashiK12, author = {Amal Dandashi and Walid Karam}, title = {Biometrics security and experiments on face recognition algorithms}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291532}, doi = {10.1109/CISDA.2012.6291532}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DandashiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/De-la-TorreRGSG12, author = {Miguel De{-}la{-}Torre and Paulo Vinicius Wolski Radtke and Eric Granger and Robert Sabourin and Dmitry O. Gorodnichy}, title = {A comparison of adaptive matchers for screening of faces in video surveillance}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291529}, doi = {10.1109/CISDA.2012.6291529}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/De-la-TorreRGSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/FalconNA12, author = {Rafael Falc{\'{o}}n and Amiya Nayak and Rami S. Abielmona}, title = {An online shadowed clustering algorithm applied to risk visualization in Territorial Security}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291542}, doi = {10.1109/CISDA.2012.6291542}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/FalconNA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/FangX12, author = {Xiaozhao Fang and Yong Xu}, title = {Combine the clustering algorithm and representation-based algorithm for concurrent classification of test samples}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291514}, doi = {10.1109/CISDA.2012.6291514}, timestamp = {Wed, 25 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/FangX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GolembewskiSG12, author = {Rene Golembewski and G{\"{u}}nter Sch{\"{a}}fer and Tobias Gerlach}, title = {Efficient communication for large-scale robust image processing with smart camera devices}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291526}, doi = {10.1109/CISDA.2012.6291526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GolembewskiSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/HuangLL12, author = {Beining Huang and Shilei Liu and Wenxin Li}, title = {A finger posture change correction method for finger-vein recognition}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291530}, doi = {10.1109/CISDA.2012.6291530}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/HuangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KeshmiriP12, author = {Soheil Keshmiri and Shahram Payandeh}, title = {Cooperation through mediation in multi-robot pursuit games}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291511}, doi = {10.1109/CISDA.2012.6291511}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KeshmiriP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KeshmiriP12a, author = {Soheil Keshmiri and Shahram Payandeh}, title = {Cooperative dynamic task-allocation through iterative agents' costs permutations}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291512}, doi = {10.1109/CISDA.2012.6291512}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KeshmiriP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KhandavilliRS12, author = {Ambica Pawan Khandavilli and Musfiq Rahman and Srinivas Sampalli}, title = {A mobile role-based access control system using identity-based encryption with zero knowledge proof}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291534}, doi = {10.1109/CISDA.2012.6291534}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KhandavilliRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KhouryHC12, author = {Rapha{\"{e}}l Khoury and Abdelwahab Hamou{-}Lhadj and Mario Couture}, title = {Towards a formal framework for evaluating the effectiveness of system diversity when applied to security}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291540}, doi = {10.1109/CISDA.2012.6291540}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KhouryHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LewisKPS12, author = {David B. Lewis and James M. Keller and Mihail Popescu and Kevin E. Stone}, title = {Dirt road segmentation using color and texture features in color imagery}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291522}, doi = {10.1109/CISDA.2012.6291522}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LewisKPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LoBN12, author = {Nassirou Lo and Jean Berger and Martin No{\"{e}}l}, title = {Toward optimizing static target search path planning}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291538}, doi = {10.1109/CISDA.2012.6291538}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LoBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PopescuPSK12, author = {Mihail Popescu and Alex Paino and Kevin E. Stone and James M. Keller}, title = {Detection of buried objects in {FLIR} imaging using mathematical morphology and {SVM}}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291520}, doi = {10.1109/CISDA.2012.6291520}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PopescuPSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Rempel12, author = {Mark Rempel}, title = {Visualizing capability requirements in planning scenarios using Principal Component Analysis}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291513}, doi = {10.1109/CISDA.2012.6291513}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Rempel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SampangiS12, author = {Raghav V. Sampangi and Srinivas Sampalli}, title = {Tag-server mutual authentication scheme based on gene transfer and genetic mutation}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291533}, doi = {10.1109/CISDA.2012.6291533}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SampangiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SharmaBJBU12, author = {Shiven Sharma and Colin Bellinger and Nathalie Japkowicz and Rodney Berg and R. Kurt Ungar}, title = {Anomaly detection in gamma ray spectra: {A} machine learning perspective}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291535}, doi = {10.1109/CISDA.2012.6291535}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/SharmaBJBU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SheltonAAVNDB12, author = {Joseph Shelton and Joshua Adams and Aniesha Alford and Melissa A. Venable and Sabra Neal and Gerry V. Dozier and Kelvin S. Bryant}, title = {Mitigating replay attacks using Darwinian-based Feature Extraction}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291539}, doi = {10.1109/CISDA.2012.6291539}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SheltonAAVNDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SuiMS12, author = {Guangye Sui and Mohamed Mejri and Hatem Ben Sta}, title = {{FASER} (Formal and Automatic Security Enforcement by Rewriting): An algebraic approach}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291527}, doi = {10.1109/CISDA.2012.6291527}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SuiMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Torunski12, author = {Eric Torunski}, title = {Cloud-based collaborative creation and simulation of courses of action: Creation of a prototype web application using new {HTML5} features}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291528}, doi = {10.1109/CISDA.2012.6291528}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Torunski12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/XieKL12, author = {Shengkun Xie and Sridhar Krishnan and Anna T. Lawniczak}, title = {Analysis of communication network surveillance using functional {ANOVA} model with unequal variances}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291541}, doi = {10.1109/CISDA.2012.6291541}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/XieKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/YangQBW12, author = {Fan Yang and Qinru Qiu and Morgan Bishop and Qing Wu}, title = {Tag-assisted sentence confabulation for intelligent text recognition}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291521}, doi = {10.1109/CISDA.2012.6291521}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/YangQBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/YingT12, author = {Hwei{-}Ming Ying and Vrizlynn L. L. Thing}, title = {An enhanced intelligent forum crawler}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291523}, doi = {10.1109/CISDA.2012.6291523}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/YingT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhangLH12, author = {Haopeng Zhang and Zhenyi Liu and Qing Hui}, title = {Optimal defense synthesis for jamming attacks in cognitive radio networks via swarm optimization}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291525}, doi = {10.1109/CISDA.2012.6291525}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhangLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Zhu12, author = {Xiaodan Zhu}, title = {Spotting keywords and sensing topic changes in speech}, booktitle = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISDA.2012.6291537}, doi = {10.1109/CISDA.2012.6291537}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/Zhu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2012, title = {2012 {IEEE} Symposium on Computational Intelligence for Security and Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6279634/proceeding}, isbn = {978-1-4673-1417-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ArndtZ11, author = {Daniel J. Arndt and Nur Zincir{-}Heywood}, title = {A Comparison of three machine learning techniques for encrypted network traffic analysis}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {107--114}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945941}, doi = {10.1109/CISDA.2011.5945941}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/ArndtZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Barbaresco11, author = {Fr{\'{e}}d{\'{e}}ric Barbaresco}, title = {Computation of most threatening radar trajectories areas and corridors based on fast-marching {\&} Level Sets}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {51--58}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945944}, doi = {10.1109/CISDA.2011.5945944}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Barbaresco11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BellingerJ11, author = {Colin Bellinger and Nathalie Japkowicz}, title = {Motivating the inclusion of meteorological indicators in the {CTBT} feature-space}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {88--95}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945945}, doi = {10.1109/CISDA.2011.5945945}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/BellingerJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Blouin11, author = {St{\'{e}}phane Blouin}, title = {Accelerating Common Operational Pictures through network consensus}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {65--71}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945939}, doi = {10.1109/CISDA.2011.5945939}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/Blouin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BuckKSDB11, author = {Andrew R. Buck and James M. Keller and Marjorie Skubic and Marcin Detyniecki and Thomas B{\"{a}}recke}, title = {Object set matching with an evolutionary algorithm}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {43--50}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945949}, doi = {10.1109/CISDA.2011.5945949}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BuckKSDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/CococcioniGR11, author = {Marco Cococcioni and Raffaele Grasso and Michel Rixen}, title = {Rapid prototyping of high performance fuzzy computing applications using high level {GPU} programming for maritime operations support}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {17--23}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945947}, doi = {10.1109/CISDA.2011.5945947}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/CococcioniGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GalwayPF11, author = {David Galway and Gerard Pieris and Giovanni Fusina}, title = {Tasking system capabilities modeling using the complexity profile}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {102--106}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945950}, doi = {10.1109/CISDA.2011.5945950}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GalwayPF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LafondD11, author = {Daniel Lafond and Michel B. Ducharme}, title = {Complex decision making experimental platform {(CODEM):} {A} counter-insurgency scenario}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {72--79}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945940}, doi = {10.1109/CISDA.2011.5945940}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LafondD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/McCarthyZ11, author = {Curtis McCarthy and Nur Zincir{-}Heywood}, title = {An investigation on identifying {SSL} traffic}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {115--122}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945943}, doi = {10.1109/CISDA.2011.5945943}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/McCarthyZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PestovP11, author = {Irene Pestov and Marcin L. Pilat}, title = {Modelling Search and Rescue systems with dynamical networks}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {31--38}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945953}, doi = {10.1109/CISDA.2011.5945953}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PestovP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SakrW11, author = {Ziad Sakr and Slawo Wesolkowski}, title = {Sensor network management using multiobjective evolutionary optimization}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {39--42}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945954}, doi = {10.1109/CISDA.2011.5945954}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SakrW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Strode11, author = {Christopher Strode}, title = {Optimising multistatic sensor locations using path planning and game theory}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {9--16}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945938}, doi = {10.1109/CISDA.2011.5945938}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Strode11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ThorntonFDB11, author = {Chris Thornton and Tom Flanagan and J{\"{o}}rg Denzinger and Jeffrey E. Boyd}, title = {Evaluating goal ordering structures for testing harbour security policies}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945937}, doi = {10.1109/CISDA.2011.5945937}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ThorntonFDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/VijverbergKW11, author = {Julien A. Vijverberg and Cornelis J. Koeleman and Peter H. N. de With}, title = {Clustering of tracklets for on-line multi-target tracking in networked camera systems}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {24--30}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945951}, doi = {10.1109/CISDA.2011.5945951}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/VijverbergKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/WojtaszekW11, author = {Daniel T. Wojtaszek and Slawo Wesolkowski}, title = {Multi-objective evolutionary optimization of a military air transportation fleet mix with the flexibility objective}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {96--101}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945946}, doi = {10.1109/CISDA.2011.5945946}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/WojtaszekW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/XieL11, author = {Shengkun Xie and Anna T. Lawniczak}, title = {Detection of stationary network load increase using univariate network aggregate traffic data by dynamic {PCA}}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {123--130}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945952}, doi = {10.1109/CISDA.2011.5945952}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/XieL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZengDLCHZ11, author = {Fanchao Zeng and James Decraene and Malcolm Yoke Hean Low and Wentong Cai and Philip Hingston and Suiping Zhou}, title = {High-dimensional objective-based data farming}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, pages = {80--87}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CISDA.2011.5945942}, doi = {10.1109/CISDA.2011.5945942}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZengDLCHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2011, title = {2011 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5937061/proceeding}, isbn = {978-1-4244-9941-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AkselrodTKDP09, author = {David Akselrod and Ratnasingham Tharmarasa and Thia Kirubarajan and Zhen Ding and Tony Ponsford}, title = {Multisensor-multitarget tracking testbed}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356526}, doi = {10.1109/CISDA.2009.5356526}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AkselrodTKDP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AkujobiLK09, author = {Frank Akujobi and Ioannis Lambadaris and Evangelos Kranakis}, title = {Detection of slow malicious worms using multi-sensor data fusion}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356557}, doi = {10.1109/CISDA.2009.5356557}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/AkujobiLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AlshammariZ09, author = {Riyad Alshammari and Nur Zincir{-}Heywood}, title = {Machine learning based encrypted traffic classification: Identifying {SSH} and Skype}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356534}, doi = {10.1109/CISDA.2009.5356534}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/AlshammariZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AlsulaimanSVEG09, author = {Fawaz A. Alsulaiman and Nizar Sakr and Julio J. Vald{\'{e}}s and Abdulmotaleb El{-}Saddik and Nicolas D. Georganas}, title = {Feature selection and classification in genetic programming: Application to haptic-based biometric data}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356540}, doi = {10.1109/CISDA.2009.5356540}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/AlsulaimanSVEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BrownCHS09, author = {Carson Brown and Alex Cowperthwaite and Abdulrahman Hijazi and Anil Somayaji}, title = {Analysis of the 1999 DARPA/Lincoln Laboratory {IDS} evaluation data with NetADHICT}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356522}, doi = {10.1109/CISDA.2009.5356522}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BrownCHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Calitoiu09, author = {Dragos Calitoiu}, title = {New search algorithm for randomly located objects: {A} non-cooperative agent based approach}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356564}, doi = {10.1109/CISDA.2009.5356564}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Calitoiu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ConnollyGS09, author = {Jean{-}Fran{\c{c}}ois Connolly and Eric Granger and Robert Sabourin}, title = {Incremental adaptation of fuzzy {ARTMAP} neural networks for video-based face classification}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356545}, doi = {10.1109/CISDA.2009.5356545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ConnollyGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DiesnerC09, author = {Jana Diesner and Kathleen M. Carley}, title = {He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356530}, doi = {10.1109/CISDA.2009.5356530}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DiesnerC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DingL09, author = {Zhen Ding and Henry Leung}, title = {Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356558}, doi = {10.1109/CISDA.2009.5356558}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DingL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/EliasE09, author = {Rimon Elias and Amal Elnahas}, title = {Fast localization in indoor environments}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356553}, doi = {10.1109/CISDA.2009.5356553}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/EliasE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Elsaesser09, author = {Derek Elsaesser}, title = {Emitter geolocation using low-accuracy direction-finding sensors}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356549}, doi = {10.1109/CISDA.2009.5356549}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Elsaesser09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ErsiT09, author = {Ehsan Fazl Ersi and John K. Tsotsos}, title = {Local feature analysis for robust face recognition}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356524}, doi = {10.1109/CISDA.2009.5356524}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ErsiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/FlanaganTD09, author = {Tom Flanagan and Chris Thornton and J{\"{o}}rg Denzinger}, title = {Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356561}, doi = {10.1109/CISDA.2009.5356561}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/FlanaganTD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/FrantzC09, author = {Terrill L. Frantz and Kathleen M. Carley}, title = {Information assurances and threat identification in networked organizations}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356532}, doi = {10.1109/CISDA.2009.5356532}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/FrantzC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GhanmiMBB09, author = {Ahmed Ghanmi and Alain Martel and Jean Berger and Abdeslem Boukhtouta}, title = {A framework for the design of a military operational supply network}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356523}, doi = {10.1109/CISDA.2009.5356523}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GhanmiMBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Gorodnichy09, author = {Dmitry O. Gorodnichy}, title = {Evolution and evaluation of biometric systems}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356531}, doi = {10.1109/CISDA.2009.5356531}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Gorodnichy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GuoC09, author = {Ruibiao J. Guo and Brad Cain}, title = {Integrating reasoning with personality effects in simulated operators}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356538}, doi = {10.1109/CISDA.2009.5356538}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GuoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/IgnakovOL09, author = {Dmitri Ignakov and Galina Okouneva and Guangjun Liu}, title = {Localization of door handle using a single camera on a door opening mobile manipulator}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356543}, doi = {10.1109/CISDA.2009.5356543}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/IgnakovOL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KaluznySGK09, author = {Bohdan Kaluzny and R. H. A. David Shaw and Ahmed Ghanmi and Beomjoon Kim}, title = {An optimisation model for airlift load planning: Galahad and the quest for the 'holy grail'}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356562}, doi = {10.1109/CISDA.2009.5356562}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KaluznySGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KannavaraB09, author = {Raghudeep Kannavara and Nikolaos G. Bourbakis}, title = {Iris biometric authentication based on local global graphs: An {FPGA} implementation}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356550}, doi = {10.1109/CISDA.2009.5356550}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KannavaraB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KayackZHB09, author = {Hilmi G{\"{u}}nes Kayacik and Nur Zincir{-}Heywood and Malcolm I. Heywood and Stefan Burschka}, title = {Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356546}, doi = {10.1109/CISDA.2009.5356546}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/KayackZHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KhreichGMS09, author = {Wael Khreich and Eric Granger and Ali Miri and Robert Sabourin}, title = {A comparison of techniques for on-line incremental learning of {HMM} parameters in anomaly detection}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356542}, doi = {10.1109/CISDA.2009.5356542}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KhreichGMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KumarHG09, author = {Amioy Kumar and Madasu Hanmandlu and H. M. Gupta}, title = {Online biometric authentication using hand vein patterns}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356554}, doi = {10.1109/CISDA.2009.5356554}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KumarHG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LaRocheZH09, author = {Patrick LaRoche and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Evolving {TCP/IP} packets: {A} case study of port scans}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356541}, doi = {10.1109/CISDA.2009.5356541}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/LaRocheZH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LabatiPS09, author = {Ruggero Donida Labati and Vincenzo Piuri and Fabio Scotti}, title = {Neural-based iterative approach for iris detection in iris recognition systems}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356533}, doi = {10.1109/CISDA.2009.5356533}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/LabatiPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Labonte09, author = {Gilles Labont{\'{e}}}, title = {Canadian artic Sovereignty: Local intervention by flocking UAVs}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356552}, doi = {10.1109/CISDA.2009.5356552}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Labonte09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LawniczakS009, author = {Anna T. Lawniczak and Bruno N. Di Stefano and Hao Wu}, title = {Detection {\&} study of DDoS attacks via entropy in data network models}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356521}, doi = {10.1109/CISDA.2009.5356521}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LawniczakS009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MartinS09, author = {Trevor Martin and Yun Shen}, title = {mTRACK - Monitoring time-varying relations in approximately categorised knowledge}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356563}, doi = {10.1109/CISDA.2009.5356563}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MartinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MazurekW09, author = {Michael Mazurek and Slawomir Wesolkowski}, title = {Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356525}, doi = {10.1109/CISDA.2009.5356525}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MazurekW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MonteroNSZ09, author = {Andres Solis Montero and Amiya Nayak and Milos Stojmenovic and Nejib Zaguia}, title = {Robust line extraction based on repeated segment directions on image contours}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356556}, doi = {10.1109/CISDA.2009.5356556}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/MonteroNSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Moon09, author = {Il{-}Chul Moon}, title = {Simulation analysis on destabilization of complex adaptive organizations}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356520}, doi = {10.1109/CISDA.2009.5356520}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Moon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MullenMBR09, author = {Robert J. Mullen and Dorothy Ndedi Monekosso and Sarah A. Barman and Paolo Remagnino}, title = {Autonomous control laws for mobile robotic surveillance swarms}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356555}, doi = {10.1109/CISDA.2009.5356555}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/MullenMBR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/PestovV09, author = {Irene Pestov and Simona Verga}, title = {Dynamical networks as a tool for system analysis and exploration}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356527}, doi = {10.1109/CISDA.2009.5356527}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/PestovV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/RhinelanderL09, author = {Jason P. Rhinelander and Peter X. Liu}, title = {Tracking a moving hypothesis for visual data with explicit switch detection}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356547}, doi = {10.1109/CISDA.2009.5356547}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/RhinelanderL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/RongS09, author = {Hai{-}Jun Rong and Narasimhan Sundararajan}, title = {Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failures}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356559}, doi = {10.1109/CISDA.2009.5356559}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/RongS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SametM09, author = {Saeed Samet and Ali Miri}, title = {Secure two and multi-party association rule mining}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356544}, doi = {10.1109/CISDA.2009.5356544}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/SametM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SarunicEM09, author = {Peter Sarunic and Robin J. Evans and William Moran}, title = {Control of unmanned aerial vehicles for passive detection and tracking of multiple emitters}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356551}, doi = {10.1109/CISDA.2009.5356551}, timestamp = {Mon, 03 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/SarunicEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SlotCB09, author = {Krzysztof Slot and Jaroslaw Cichosz and Lukasz Bronakowski}, title = {Application of voiced-speech variability descriptors to emotion recognition}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356537}, doi = {10.1109/CISDA.2009.5356537}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SlotCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/StirtzingerAM09, author = {Anthony Stirtzinger and Craig S. Anken and Bruce McQueary}, title = {Goal-driven semi-automated generation of semantic models}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356518}, doi = {10.1109/CISDA.2009.5356518}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/StirtzingerAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SujitSP09, author = {P. B. Sujit and Jo{\~{a}}o Borges de Sousa and Fernando M. Lobo Pereira}, title = {Multiple {UAV} teams for multiple tasks}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356535}, doi = {10.1109/CISDA.2009.5356535}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SujitSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SundaramRS09, author = {Suresh Sundaram and Hai{-}Jun Rong and Narasimhan Sundararajan}, title = {Bio-inspired computing for launch vehicle design and trajectory optimization}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356548}, doi = {10.1109/CISDA.2009.5356548}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SundaramRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Suresh09, author = {Suresh Suresh}, title = {Adaptive neural flight control system for helicopter}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356560}, doi = {10.1109/CISDA.2009.5356560}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Suresh09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TavallaeeBLG09, author = {Mahbod Tavallaee and Ebrahim Bagheri and Wei Lu and Ali A. Ghorbani}, title = {A detailed analysis of the {KDD} {CUP} 99 data set}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356528}, doi = {10.1109/CISDA.2009.5356528}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TavallaeeBLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TharmarasaKL09, author = {Ratnasingham Tharmarasa and Thia Kirubarajan and Thomas Lang}, title = {Joint path planning and sensor subset selection for multistatic sensor networks}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356539}, doi = {10.1109/CISDA.2009.5356539}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TharmarasaKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TharmarasaKM09, author = {Ratnasingham Tharmarasa and Thia Kirubarajan and Michael McDonald}, title = {Passive multitarget tracking using transmitters of opportunity}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356536}, doi = {10.1109/CISDA.2009.5356536}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TharmarasaKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TrifiloBB09, author = {Antonio Trifilo and Stefan Burschka and Ernst W. Biersack}, title = {Traffic to protocol reverse engineering}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356565}, doi = {10.1109/CISDA.2009.5356565}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TrifiloBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/UsmaniAK09, author = {Zeeshan{-}ul{-}hassan Usmani and Fawzi A. Alghamdi and Daniel Kirk}, title = {BlastSim - Multi agent simulation of suicide bombing}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356529}, doi = {10.1109/CISDA.2009.5356529}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/UsmaniAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZamanK09, author = {Safaa Zaman and Fakhri Karray}, title = {Collaborative architecture for distributed intrusion detection system}, booktitle = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CISDA.2009.5356567}, doi = {10.1109/CISDA.2009.5356567}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZamanK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2009, title = {2009 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5351161/proceeding}, isbn = {978-1-4244-3764-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/0007LWZ07, author = {Lin Wang and Yongping Li and Chengbo Wang and Hongzhou Zhang}, title = {Face Recognition using Gaborface-based 2DPCA and (2D)\({}^{\mbox{2}}\)PCA Classification with Ensemble and Multichannel Model}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {1--6}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368128}, doi = {10.1109/CISDA.2007.368128}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/0007LWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BarlowYA07, author = {Michael Barlow and Ang Yang and Hussein A. Abbass}, title = {A Temporal Risk Assessment Framework for Planning {A} Future Force Structure}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {100--107}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368141}, doi = {10.1109/CISDA.2007.368141}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BarlowYA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Benjamin07, author = {David P. Benjamin}, title = {A Cognitive Approach to Intrusion Detection}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {161--168}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368149}, doi = {10.1109/CISDA.2007.368149}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Benjamin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ChaiW07, author = {Huimin Chai and Baoshu Wang}, title = {A Template-based Method for Force Group Classification in Situation Assessment}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {85--91}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368139}, doi = {10.1109/CISDA.2007.368139}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ChaiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DePass07, author = {Beth DePass}, title = {Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {50--56}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368134}, doi = {10.1109/CISDA.2007.368134}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DePass07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DorisS07, author = {Kenneth Doris and David Silvia}, title = {Improved Missile Route Planning and Targeting using Game-Based Computational Intelligence}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {63--68}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368136}, doi = {10.1109/CISDA.2007.368136}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DorisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GrimailaF07, author = {Michael R. Grimaila and Larry Fortson}, title = {Towards an Information Asset-Based Defensive Cyber Damage Assessment Process}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {206--212}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368155}, doi = {10.1109/CISDA.2007.368155}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GrimailaF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KananFH07, author = {Hamidreza Rashidy Kanan and Karim Faez and Mehdi Hosseinzadeh Aghdam}, title = {Face Recognition System Using Ant Colony Optimization-Based Selected Features}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {57--62}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368135}, doi = {10.1109/CISDA.2007.368135}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/KananFH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KansalAL07, author = {Smriti Kansal and Ashraf M. Abusharekh and Alexander H. Levis}, title = {Computationally Derived Models of Adversary Organizations}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {92--99}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368140}, doi = {10.1109/CISDA.2007.368140}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KansalAL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KayacikZH07, author = {Hilmi G{\"{u}}nes Kayacik and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Automatically Evading {IDS} Using {GP} Authored Attacks}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {153--160}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368148}, doi = {10.1109/CISDA.2007.368148}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/KayacikZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KleemanLHG07, author = {Mark P. Kleeman and Gary B. Lamont and Kenneth M. Hopkinson and Scott R. Graham}, title = {Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {33--41}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368132}, doi = {10.1109/CISDA.2007.368132}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KleemanLHG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LongHJSM07, author = {Lyle N. Long and Scott D. Hanford and Oranuj Janrathitikarn and Greg L. Sinsley and Jodi A. Miller}, title = {A Review of Intelligent Systems Software for Autonomous Vehicles}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {69--76}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368137}, doi = {10.1109/CISDA.2007.368137}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/LongHJSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MakanjuLZ07, author = {Adetokunbo Makanju and Patrick LaRoche and Nur Zincir{-}Heywood}, title = {A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {213--219}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368156}, doi = {10.1109/CISDA.2007.368156}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/MakanjuLZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MartinAS07, author = {Trevor Martin and Ben Azvine and Yun Shen}, title = {Computational Intelligence Support for Smart Queries and Adaptive Data}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {77--84}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368138}, doi = {10.1109/CISDA.2007.368138}, timestamp = {Sat, 29 Apr 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MartinAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MoskovitchGPSGSE07, author = {Robert Moskovitch and Ido Gus and Shay Pluderman and Dima Stopel and Chanan Glezer and Yuval Shahar and Yuval Elovici}, title = {Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {169--177}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368150}, doi = {10.1109/CISDA.2007.368150}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MoskovitchGPSGSE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NajgebauerATRKPW07, author = {Andrzej Najgebauer and Ryszard Antkiewicz and Zbigniew Tarapata and Jaroslaw Rulka and Wojciech Kulas and Dariusz Pierzchala and Roman Wantoch{-}Rekowski}, title = {The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {145--152}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368147}, doi = {10.1109/CISDA.2007.368147}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/NajgebauerATRKPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SinsleyMLGNH07, author = {Gregory L. Sinsley and Jodi A. Miller and Lyle N. Long and Brian R. Geiger and Albert F. Niessner and Joseph F. Horn}, title = {An Intelligent Controller for Collaborative Unmanned Air Vehicles}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {139--144}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368146}, doi = {10.1109/CISDA.2007.368146}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/SinsleyMLGNH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Srinoy07, author = {Surat Srinoy}, title = {Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {186--192}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368152}, doi = {10.1109/CISDA.2007.368152}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Srinoy07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/StevensW07, author = {Michael Stevens and Paul D. Williams}, title = {Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {193--200}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368153}, doi = {10.1109/CISDA.2007.368153}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/StevensW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/TaylorSEDH07, author = {Glenn Taylor and Brian Stensrud and Susan Eitelman and Cory Dunham and Echo A. Harger}, title = {Toward Automating Airspace Management}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {124--130}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368144}, doi = {10.1109/CISDA.2007.368144}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/TaylorSEDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/VanesianK07, author = {Tasha Vanesian and Kenneth Kreutz{-}Delgado}, title = {Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {108--115}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368142}, doi = {10.1109/CISDA.2007.368142}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/VanesianK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/WagenhalsL07, author = {Lee W. Wagenhals and Alexander H. Levis}, title = {Course of Action Analysis in a Cultural Landscape Using Influence Nets}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {116--123}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368143}, doi = {10.1109/CISDA.2007.368143}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/WagenhalsL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/WolfPOB07, author = {Matt B. Wolf and WonKyung Park and Jae C. Oh and Misty K. Blowers}, title = {Toward Open-Set Text-Independent Speaker Identification in Tactical Communications}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {7--14}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368129}, doi = {10.1109/CISDA.2007.368129}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/WolfPOB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Wong07, author = {Ted Wong}, title = {{ATR} Applications in Military Missions}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {30--32}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368131}, doi = {10.1109/CISDA.2007.368131}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Wong07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/WuQLBMF07, author = {Qing Wu and Qinru Qiu and Richard W. Linderman and Daniel J. Burns and Michael J. Moore and Dennis Fitzgerald}, title = {Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {201--205}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368154}, doi = {10.1109/CISDA.2007.368154}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/WuQLBMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZaidiL07, author = {Abbas K. Zaidi and Alexander H. Levis}, title = {Computational Verification of System Architectures}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {42--49}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368133}, doi = {10.1109/CISDA.2007.368133}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZaidiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhangW07, author = {Like Zhang and Gregory B. White}, title = {Anomaly Detection for Application Level Network Attacks Using Payload Keywords}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {178--185}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368151}, doi = {10.1109/CISDA.2007.368151}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhengM07, author = {Yuhua Zheng and Yan Meng}, title = {The PSO-Based Adaptive Window for People Tracking}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {23--29}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368130}, doi = {10.1109/CISDA.2007.368130}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhengM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhouA07, author = {Xiaowei Zhou and Plamen P. Angelov}, title = {Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier}, booktitle = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, pages = {131--138}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CISDA.2007.368145}, doi = {10.1109/CISDA.2007.368145}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhouA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2007, title = {2007 {IEEE} Symposium on Computational Intelligence in Security and Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5, 2007}, publisher = {{IEEE}}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4219070/proceeding}, isbn = {1-4244-0700-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.