Search dblp for Publications

export results for "stream:streams/conf/cisda:"

 download as .bib file

@inproceedings{DBLP:conf/cisda/AmannaAFR15,
  author       = {Ashwin E. Amanna and
                  Daniel Ali and
                  David Gonzalez Fitch and
                  Jeffrey H. Reed},
  title        = {Design of experiments based empirical models to support cognitive
                  radio decision making},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208627},
  doi          = {10.1109/CISDA.2015.7208627},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AmannaAFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AndersonD15,
  author       = {Gustave Anderson and
                  David J. Dorsey},
  title        = {Ternary trust metric for mobile ad-hoc networks},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208633},
  doi          = {10.1109/CISDA.2015.7208633},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AndersonD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AvvariSMZNPH15,
  author       = {Gopi Vinod Avvari and
                  David Sidoti and
                  Manisha Mishra and
                  Lingyi Zhang and
                  Bala Kishore Nadella and
                  Krishna R. Pattipati and
                  James A. Hansen},
  title        = {Dynamic asset allocation for counter-smuggling operations under disconnected,
                  intermittent and low-bandwidth environment},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208622},
  doi          = {10.1109/CISDA.2015.7208622},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AvvariSMZNPH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BalasingamPLR15,
  author       = {Balakumar Balasingam and
                  Krishna R. Pattipati and
                  Georgiy M. Levchuk and
                  John C. Romano},
  title        = {Robust collaborative learning by multi-agents},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208646},
  doi          = {10.1109/CISDA.2015.7208646},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BalasingamPLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BalkanliZ15,
  author       = {Eray Balkanli and
                  Nur Zincir{-}Heywood},
  title        = {Highlights on analyzing one-way traffic using different tools},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208635},
  doi          = {10.1109/CISDA.2015.7208635},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/BalkanliZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DaneshZWMTY15,
  author       = {Wafi Danesh and
                  Chenyuan Zhao and
                  Bryant T. Wysocki and
                  Michael J. Medley and
                  Ngwe Thawdar and
                  Yang Yi},
  title        = {Channel estimation in wireless {OFDM} systems using reservoir computing},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208638},
  doi          = {10.1109/CISDA.2015.7208638},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DaneshZWMTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DonahueMSDOKW15,
  author       = {Colin Donahue and
                  Cory E. Merkel and
                  Qutaiba Saleh and
                  Levs Dolgovs and
                  Yu Kee Ooi and
                  Dhireesha Kudithipudi and
                  Bryant T. Wysocki},
  title        = {Design and analysis of neuromemristive echo state networks with limited-precision
                  synapses},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208623},
  doi          = {10.1109/CISDA.2015.7208623},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DonahueMSDOKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GoudarziSS15,
  author       = {Alireza Goudarzi and
                  Alireza Shabani and
                  Darko Stefanovic},
  title        = {Exploring transfer function nonlinearity in echo state networks},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208637},
  doi          = {10.1109/CISDA.2015.7208637},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GoudarziSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/JagannathSD15,
  author       = {Jithin Jagannath and
                  Hanne M. Saarinen and
                  Andrew L. Drozd},
  title        = {Framework for automatic signal classification techniques {(FACT)}
                  for software defined radios},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208628},
  doi          = {10.1109/CISDA.2015.7208628},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/JagannathSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KaneB15,
  author       = {Matthew Kane and
                  Daniel Bennett},
  title        = {Detecting Push to Talk radios using two tone intermodulation distortion},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208629},
  doi          = {10.1109/CISDA.2015.7208629},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KaneB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KovalerchukP15,
  author       = {Boris Kovalerchuk and
                  Leonid I. Perlovsky},
  title        = {Rigorous sensor resource management: Methodology and evolutionary
                  optimization},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208621},
  doi          = {10.1109/CISDA.2015.7208621},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KovalerchukP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LevchukB15,
  author       = {Georgiy Levchuk and
                  Erik Blasch},
  title        = {Probabilistic graphical models for multi-source fusion from text sources},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208640},
  doi          = {10.1109/CISDA.2015.7208640},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LevchukB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LiLYYSLCZWJ15,
  author       = {Hai (Helen) Li and
                  Chenchen Liu and
                  Bonan Yan and
                  Chaofei Yang and
                  Linghao Song and
                  Zheng Li and
                  Yiran Chen and
                  Weijie Zhu and
                  Qing Wu and
                  Hao Jiang},
  title        = {Spiking-based matrix computation by leveraging memristor crossbar
                  array},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208626},
  doi          = {10.1109/CISDA.2015.7208626},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LiLYYSLCZWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Liu15,
  author       = {Ziqian Liu},
  title        = {Risk sensitive optimal synchronization of coupled stochastic neural
                  networks with chaotic phenomena},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208632},
  doi          = {10.1109/CISDA.2015.7208632},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Liu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LoeMD15,
  author       = {Richard Loe and
                  Christopher Maracchion and
                  Andrew L. Drozd},
  title        = {Semi-autonomous management of multiple ad-hoc teams of UAVs},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208620},
  doi          = {10.1109/CISDA.2015.7208620},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LoeMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ManemBXCGC15,
  author       = {Harika Manem and
                  Karsten Beckmann and
                  Min Xu and
                  Robert Carroll and
                  Robert E. Geer and
                  Nathaniel C. Cady},
  title        = {An extendable multi-purpose 3D neuromorphic fabric using nanoscale
                  memristors},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208625},
  doi          = {10.1109/CISDA.2015.7208625},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ManemBXCGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MiaoHTHDR15,
  author       = {Sheng Miao and
                  Robert J. Hammell II and
                  Ziying Tang and
                  Timothy P. Hanratty and
                  John Dumer and
                  John T. Richardson},
  title        = {Integrating complementary/contradictory information into fuzzy-based
                  VoI determinations},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208636},
  doi          = {10.1109/CISDA.2015.7208636},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MiaoHTHDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MurtazaKHG15,
  author       = {Syed Shariyar Murtaza and
                  Wael Khreich and
                  Abdelwahab Hamou{-}Lhadj and
                  St{\'{e}}phane Gagnon},
  title        = {A trace abstraction approach for host-based anomaly detection},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208644},
  doi          = {10.1109/CISDA.2015.7208644},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MurtazaKHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NelsonCAKTB15,
  author       = {Kevin Nelson and
                  George Corbin and
                  Mark Anania and
                  Matthew Kovacs and
                  Jeremy Tobias and
                  Misty K. Blowers},
  title        = {Evaluating model drift in machine learning algorithms},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208643},
  doi          = {10.1109/CISDA.2015.7208643},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NelsonCAKTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NjillaP15,
  author       = {Laurent Yamen Njilla and
                  Niki Pissinou},
  title        = {Dynamics of data delivery in mobile ad-hoc networks: {A} bargaining
                  game approach},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208634},
  doi          = {10.1109/CISDA.2015.7208634},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NjillaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Patel15,
  author       = {Hiren Patel},
  title        = {Non-parametric feature generation for RF-fingerprinting on ZigBee
                  devices},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208645},
  doi          = {10.1109/CISDA.2015.7208645},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Patel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ReynoldsCES15,
  author       = {Joshua Reynolds and
                  Lauren A. Christopher and
                  Russ Eberhart and
                  Patrick Shaffer},
  title        = {Using computational swarm intelligence for real-time asset allocation},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208619},
  doi          = {10.1109/CISDA.2015.7208619},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ReynoldsCES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/RodriguezKK15,
  author       = {Manuel Rodr{\'{\i}}guez and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua},
  title        = {On the use of design diversity in fault tolerant and secure systems:
                  {A} qualitative analysis},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208639},
  doi          = {10.1109/CISDA.2015.7208639},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/RodriguezKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SalehMKW15,
  author       = {Qutaiba Saleh and
                  Cory E. Merkel and
                  Dhireesha Kudithipudi and
                  Bryant T. Wysocki},
  title        = {Memristive computational architecture of an echo state network for
                  real-time speech-emotion recognition},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208624},
  doi          = {10.1109/CISDA.2015.7208624},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SalehMKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Schafer15,
  author       = {Carlo Sch{\"{a}}fer},
  title        = {Detection of compromised email accounts used for spamming in correlation
                  with mail user agent access activities extracted from metadata},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208641},
  doi          = {10.1109/CISDA.2015.7208641},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Schafer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Schaffer15,
  author       = {J. David Schaffer},
  title        = {Evolving spiking neural networks: {A} novel growth algorithm corrects
                  the teacher},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208630},
  doi          = {10.1109/CISDA.2015.7208630},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Schaffer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhaoDWY15,
  author       = {Chenyuan Zhao and
                  Wafi Danesh and
                  Bryant T. Wysocki and
                  Yang Yi},
  title        = {Neuromorphic encoding system design with chaos based {CMOS} analog
                  neuron},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208631},
  doi          = {10.1109/CISDA.2015.7208631},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhaoDWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhaoKKR15,
  author       = {Hong Zhao and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Manuel Rodr{\'{\i}}guez},
  title        = {Applying chaos theory for runtime Hardware Trojan detection},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208642},
  doi          = {10.1109/CISDA.2015.7208642},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhaoKKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2015,
  title        = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7165058/proceeding},
  isbn         = {978-1-4673-7557-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Anh14,
  author       = {Nguyen Hoai Anh},
  title        = {A multi-objective method for discovery of pathways in protein-protein
                  interaction networks},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035631},
  doi          = {10.1109/CISDA.2014.7035631},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Anh14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AvedyanGP14,
  author       = {Eduard Avedyan and
                  Alexander I. Galushkin and
                  Dmitry V. Pantiukhin},
  title        = {Neural network technologies for information systems security},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035632},
  doi          = {10.1109/CISDA.2014.7035632},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AvedyanGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Barnabe-LortieB14,
  author       = {Vincent Barnabe{-}Lortie and
                  Colin Bellinger and
                  Nathalie Japkowicz},
  title        = {Smoothing gamma ray spectra to improve outlier detection},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035633},
  doi          = {10.1109/CISDA.2014.7035633},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/Barnabe-LortieB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ChimedtserenITK14,
  author       = {Enkhbold Chimedtseren and
                  Keisuke Iwai and
                  Hidema Tanaka and
                  Takakazu Kurokawa},
  title        = {Intrusion detection system using Discrete Fourier Transform},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035624},
  doi          = {10.1109/CISDA.2014.7035624},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ChimedtserenITK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ChusilpCN14,
  author       = {Pawat Chusilp and
                  Weerawut Charubhun and
                  Otsin Nilubol},
  title        = {Effects of the cookie cutter function shapes on Monte Carlo simulations
                  of weapon effectiveness},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035622},
  doi          = {10.1109/CISDA.2014.7035622},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ChusilpCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/CurtisHAP14,
  author       = {Phillip Curtis and
                  Moufid Harb and
                  Rami S. Abielmona and
                  Emil M. Petriu},
  title        = {Behavior-driven video analytics system for critical infrastructure
                  protection},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035630},
  doi          = {10.1109/CISDA.2014.7035630},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/CurtisHAP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DangDN14,
  author       = {Thai Thinh Dang and
                  Trong Hai Duong and
                  Hong Son Nguyen},
  title        = {A hybrid framework for enhancing correlation to solve cold-start problem
                  in recommender systems},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035626},
  doi          = {10.1109/CISDA.2014.7035626},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DangDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DangKSYN14,
  author       = {Viet{-}Chau Dang and
                  Masao Kubo and
                  Hiroshi Sato and
                  Akihiro Yamaguchi and
                  Akira Namatame},
  title        = {A simple braking model for detecting incidents locations by smartphones},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035625},
  doi          = {10.1109/CISDA.2014.7035625},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DangKSYN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DinhTJ14,
  author       = {Quan Dang Dinh and
                  Quang{-}Anh Tran and
                  Frank Jiang},
  title        = {Automated generation of ham rules for Vietnamese spam filtering},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035628},
  doi          = {10.1109/CISDA.2014.7035628},
  timestamp    = {Sat, 08 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DinhTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/FalconABPA14,
  author       = {Rafael Falcon and
                  Rami S. Abielmona and
                  Sean Billings and
                  Alex Plachkov and
                  Hussein A. Abbass},
  title        = {Risk management with hard-soft data fusion in maritime domain awareness},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035641},
  doi          = {10.1109/CISDA.2014.7035641},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/FalconABPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/HungN14,
  author       = {Nguyen Manh Hung and
                  Vu Duy Nhat},
  title        = {B-tree based two-dimensional early packet rejection technique against
                  DoS traffic targeting firewall default security rule},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035643},
  doi          = {10.1109/CISDA.2014.7035643},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/HungN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KavakebNBYJ14,
  author       = {Shayan Kavakeb and
                  Trung Thanh Nguyen and
                  Mohamed Benmerikhi and
                  Zaili Yang and
                  Ian Jenkinson},
  title        = {An improved memetic algorithm to enhance the sustainability and reliability
                  of transport in container terminals},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035627},
  doi          = {10.1109/CISDA.2014.7035627},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/KavakebNBYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LeCNN14,
  author       = {Thi Anh Le and
                  Thi Huong Chu and
                  Quang Uy Nguyen and
                  Xuan Hoai Nguyen},
  title        = {Malware detection using genetic programming},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035623},
  doi          = {10.1109/CISDA.2014.7035623},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LeCNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MiahNSG14,
  author       = {Md. Suruz Miah and
                  Bao Nguyen and
                  Davide Spinello and
                  Wail Gueaieb},
  title        = {Maritime air defence firing tactics},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035639},
  doi          = {10.1109/CISDA.2014.7035639},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MiahNSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Nguyen14,
  author       = {Ngoc Tran Nguyen},
  title        = {An efficient LBP-based descriptor for real-time object detection},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035635},
  doi          = {10.1109/CISDA.2014.7035635},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Nguyen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NguyenDN14,
  author       = {Mau Uyen Nguyen and
                  Thanh Tinh Dao and
                  Long Thanh Ngo},
  title        = {A fuzzy-based approach for approximating depth information in {RGB-D}
                  images},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035636},
  doi          = {10.1109/CISDA.2014.7035636},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NguyenDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NguyenM14,
  author       = {Bao Nguyen and
                  Md. Suruz Miah},
  title        = {Analysis of maritime air defence scenarios},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035638},
  doi          = {10.1109/CISDA.2014.7035638},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NguyenM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NguyenTB14,
  author       = {Long Nguyen and
                  Anh Quang Tran and
                  Lam Thu Bui},
  title        = {{DMEA-II} and its application on spam email detection problems},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035634},
  doi          = {10.1109/CISDA.2014.7035634},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/NguyenTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NhuongNTPD14,
  author       = {Nguyen Van Nhuong and
                  Vo Thi Yen Nhi and
                  Cam Nguyen Tan and
                  Phu Xuan Mai and
                  Tan Cao Dang},
  title        = {SSSM-semantic set and string matching based malware detection},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035642},
  doi          = {10.1109/CISDA.2014.7035642},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/NhuongNTPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PetrakiA14,
  author       = {Eleni Petraki and
                  Hussein A. Abbass},
  title        = {On trust and influence: {A} computational red teaming game theoretic
                  perspective},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035644},
  doi          = {10.1109/CISDA.2014.7035644},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PetrakiA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PhanS14,
  author       = {Dung H. Phan and
                  Junichi Suzuki},
  title        = {{R2-BEAN:} {R2} indicator based evolutionary algorithm for noisy multiobjective
                  optimization},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035637},
  doi          = {10.1109/CISDA.2014.7035637},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PhanS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TinhTDA14,
  author       = {Cao Huu Tinh and
                  Vu Hoa Tien and
                  Nguyen Cong Dinh and
                  Ngoc Anh Mai},
  title        = {Design of Takagi-Sugeno fuzzy controller for automatic stabilization
                  system of missiles with blended aerodynamic and lateral impulsive
                  reaction-jet},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035629},
  doi          = {10.1109/CISDA.2014.7035629},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TinhTDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TranNWJ14,
  author       = {Hoang Anh Q. Tran and
                  Akira Namatame and
                  Augie Widyotriatmo and
                  Endra Joelianto},
  title        = {An optimization procedure for enhancing network robustness against
                  cascading failures},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035645},
  doi          = {10.1109/CISDA.2014.7035645},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TranNWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TrinhOA14,
  author       = {Minh Hoang Trinh and
                  Kwang{-}Kyo Oh and
                  Hyo{-}Sung Ahn},
  title        = {Control of a mobile agent using only bearing measurements in triangular
                  region},
  booktitle    = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISDA.2014.7035640},
  doi          = {10.1109/CISDA.2014.7035640},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TrinhOA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2014,
  title        = {Seventh {IEEE} Symposium on Computational Intelligence for Security
                  and Defense Applications, {CISDA} 2014, Cau Giay, Vietnam, December
                  14-17, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7010459/proceeding},
  isbn         = {978-1-4799-5431-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AraujoSS13,
  author       = {J. F. Araujo and
                  P. B. Sujit and
                  Jo{\~{a}}o B. Sousa},
  title        = {Multiple {UAV} area decomposition and coverage},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {30--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595424},
  doi          = {10.1109/CISDA.2013.6595424},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AraujoSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AruneshwaranSWV13,
  author       = {R. Aruneshwaran and
                  Suresh Sundaram and
                  Jianliang Wang and
                  T. K. Venugopalan},
  title        = {Neural adaptive flight controller for ducted-fan {UAV} performing
                  nonlinear maneuver},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {51--56},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595427},
  doi          = {10.1109/CISDA.2013.6595427},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AruneshwaranSWV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BallingerL13,
  author       = {Christopher A. Ballinger and
                  Sushil J. Louis},
  title        = {Comparing heuristic search methods for finding effective real-time
                  strategy game plans},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {16--22},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595422},
  doi          = {10.1109/CISDA.2013.6595422},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BallingerL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ForoushaniZ13,
  author       = {Vahid Aghaei Foroushani and
                  Nur Zincir{-}Heywood},
  title        = {Investigating application behavior in network traffic traces},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595430},
  doi          = {10.1109/CISDA.2013.6595430},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/ForoushaniZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GaoJNTP13,
  author       = {Mingsheng Gao and
                  Jun Jiang and
                  Kien Ming Ng and
                  Kwong Meng Teo and
                  Kim{-}Leng Poh},
  title        = {Cooperative path planning for UAVs with {UAV} loss considerations},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595425},
  doi          = {10.1109/CISDA.2013.6595425},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/GaoJNTP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/HohzakiMT13,
  author       = {Ryusuke Hohzaki and
                  Syuhei Morita and
                  Yoshiharu Terashima},
  title        = {A patrol problem in a building by search theory},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {104--111},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595434},
  doi          = {10.1109/CISDA.2013.6595434},
  timestamp    = {Mon, 04 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/HohzakiMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/HuLCWR13,
  author       = {Miao Hu and
                  Hai Li and
                  Yiran Chen and
                  Qing Wu and
                  Garrett S. Rose},
  title        = {{BSB} training scheme implementation on memristor-based circuit},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {80--87},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595431},
  doi          = {10.1109/CISDA.2013.6595431},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/HuLCWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/IsmailPAS13,
  author       = {Shaik Ismail and
                  Abhay A. Pashilkar and
                  Ramakalyan Ayyagari and
                  N. Sundararajan},
  title        = {Improved autolanding controller for aircraft encountering unknown
                  actuator failures},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {96--103},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595433},
  doi          = {10.1109/CISDA.2013.6595433},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/IsmailPAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MallikS13,
  author       = {Galib R. Mallik and
                  Arpita Sinha},
  title        = {A novel obstacle avoidance control algorithm in a dynamic environment},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {57--63},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595428},
  doi          = {10.1109/CISDA.2013.6595428},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MallikS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/OberbergerLN13,
  author       = {Michael Oberberger and
                  Sushil J. Louis and
                  Monica N. Nicolescu},
  title        = {Evolving team tactics using potential fields},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595420},
  doi          = {10.1109/CISDA.2013.6595420},
  timestamp    = {Sun, 20 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/OberbergerLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PashilkarIAS13,
  author       = {Abhay A. Pashilkar and
                  Shaik Ismail and
                  Ramakalyan Ayyagari and
                  Narasimhan Sundararajan},
  title        = {Design of a nonlinear dynamic inversion controller for trajectory
                  following and maneuvering for fixed wing aircraft},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {64--71},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595429},
  doi          = {10.1109/CISDA.2013.6595429},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PashilkarIAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/RastegariHLB13,
  author       = {Samaneh Rastegari and
                  Philip Hingston and
                  Chiou Peng Lam and
                  M. Brand},
  title        = {Testing a distributed denial of service defence mechanism using red
                  teaming},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {23--29},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595423},
  doi          = {10.1109/CISDA.2013.6595423},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/RastegariHLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SenthilnathOMK13,
  author       = {J. Senthilnath and
                  S. N. Omkar and
                  V. Mani and
                  Anurag R. Katti},
  title        = {Cooperative communication of {UAV} to perform multi-task using nature
                  inspired techniques},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595426},
  doi          = {10.1109/CISDA.2013.6595426},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SenthilnathOMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ShridharanKP13,
  author       = {S. Shridharan and
                  R. Kumar and
                  S. K. Pundir},
  title        = {Positioning of military combat units through weight-based terrain
                  analysis using {NASA} World Wind},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {9--15},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595421},
  doi          = {10.1109/CISDA.2013.6595421},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ShridharanKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TambouratzisCP13,
  author       = {Tatiana Tambouratzis and
                  Dina Chernikova and
                  Imre P{\'{a}}zsit},
  title        = {A comparison of artificial neural network performance: The case of
                  neutron/gamma pulse shape discrimination},
  booktitle    = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISDA.2013.6595432},
  doi          = {10.1109/CISDA.2013.6595432},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/TambouratzisCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2013,
  title        = {2013 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2013, Singapore, April 16-19, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6588670/proceeding},
  isbn         = {978-1-4673-5911-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Abramson12,
  author       = {Myriam Abramson},
  title        = {Toward the attribution of Web behavior},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291524},
  doi          = {10.1109/CISDA.2012.6291524},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Abramson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AlmagambetovCV12,
  author       = {Akhan Almagambetov and
                  Mauricio Casares and
                  Senem Velipasalar},
  title        = {Autonomous tracking of vehicle rear lights and detection of brakes
                  and turn signals},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291543},
  doi          = {10.1109/CISDA.2012.6291543},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AlmagambetovCV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AlsulaimanVE12,
  author       = {Fawaz A. Alsulaiman and
                  Julio J. Vald{\'{e}}s and
                  Abdulmotaleb El{-}Saddik},
  title        = {Identity verification based on haptic handwritten signatures: Genetic
                  programming with unbalanced data},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291531},
  doi          = {10.1109/CISDA.2012.6291531},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/AlsulaimanVE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AndersonSSK12,
  author       = {Derek T. Anderson and
                  Ozy Sjahputera and
                  Kevin E. Stone and
                  James M. Keller},
  title        = {Causal cueing system for above ground anomaly detection of explosive
                  hazards using support vector machine localized by K-nearest neighbor},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291519},
  doi          = {10.1109/CISDA.2012.6291519},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AndersonSSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BissessarGST12,
  author       = {David Bissessar and
                  Dmitry O. Gorodnichy and
                  Alex Stoianov and
                  Michael Thieme},
  title        = {Assessment of privacy enhancing technologies for biometrics},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291517},
  doi          = {10.1109/CISDA.2012.6291517},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BissessarGST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Blouin12,
  author       = {St{\'{e}}phane Blouin},
  title        = {Managing data latency for consensus over dynamic sensor-networks},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291518},
  doi          = {10.1109/CISDA.2012.6291518},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/Blouin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/CaiLG12,
  author       = {Zixing Cai and
                  Yi Li and
                  Mingqin Gu},
  title        = {Real-time recognition system of traffic light in urban environment},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291516},
  doi          = {10.1109/CISDA.2012.6291516},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/CaiLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/CarpuatGI12,
  author       = {Marine Carpuat and
                  Cyril Goutte and
                  Pierre Isabelle},
  title        = {Filtering and routing multilingual documents for translation},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291536},
  doi          = {10.1109/CISDA.2012.6291536},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/CarpuatGI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/CheungW12,
  author       = {Pak{-}Ming Cheung and
                  Kam{-}Tim Woo},
  title        = {MCMC-based human tracking with stereo cameras under frequent interaction
                  and occlusion},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291515},
  doi          = {10.1109/CISDA.2012.6291515},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/CheungW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DandashiK12,
  author       = {Amal Dandashi and
                  Walid Karam},
  title        = {Biometrics security and experiments on face recognition algorithms},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291532},
  doi          = {10.1109/CISDA.2012.6291532},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DandashiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/De-la-TorreRGSG12,
  author       = {Miguel De{-}la{-}Torre and
                  Paulo Vinicius Wolski Radtke and
                  Eric Granger and
                  Robert Sabourin and
                  Dmitry O. Gorodnichy},
  title        = {A comparison of adaptive matchers for screening of faces in video
                  surveillance},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291529},
  doi          = {10.1109/CISDA.2012.6291529},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/De-la-TorreRGSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/FalconNA12,
  author       = {Rafael Falc{\'{o}}n and
                  Amiya Nayak and
                  Rami S. Abielmona},
  title        = {An online shadowed clustering algorithm applied to risk visualization
                  in Territorial Security},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291542},
  doi          = {10.1109/CISDA.2012.6291542},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/FalconNA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/FangX12,
  author       = {Xiaozhao Fang and
                  Yong Xu},
  title        = {Combine the clustering algorithm and representation-based algorithm
                  for concurrent classification of test samples},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291514},
  doi          = {10.1109/CISDA.2012.6291514},
  timestamp    = {Wed, 25 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/FangX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GolembewskiSG12,
  author       = {Rene Golembewski and
                  G{\"{u}}nter Sch{\"{a}}fer and
                  Tobias Gerlach},
  title        = {Efficient communication for large-scale robust image processing with
                  smart camera devices},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291526},
  doi          = {10.1109/CISDA.2012.6291526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GolembewskiSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/HuangLL12,
  author       = {Beining Huang and
                  Shilei Liu and
                  Wenxin Li},
  title        = {A finger posture change correction method for finger-vein recognition},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291530},
  doi          = {10.1109/CISDA.2012.6291530},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/HuangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KeshmiriP12,
  author       = {Soheil Keshmiri and
                  Shahram Payandeh},
  title        = {Cooperation through mediation in multi-robot pursuit games},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291511},
  doi          = {10.1109/CISDA.2012.6291511},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KeshmiriP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KeshmiriP12a,
  author       = {Soheil Keshmiri and
                  Shahram Payandeh},
  title        = {Cooperative dynamic task-allocation through iterative agents' costs
                  permutations},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291512},
  doi          = {10.1109/CISDA.2012.6291512},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KeshmiriP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KhandavilliRS12,
  author       = {Ambica Pawan Khandavilli and
                  Musfiq Rahman and
                  Srinivas Sampalli},
  title        = {A mobile role-based access control system using identity-based encryption
                  with zero knowledge proof},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291534},
  doi          = {10.1109/CISDA.2012.6291534},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KhandavilliRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KhouryHC12,
  author       = {Rapha{\"{e}}l Khoury and
                  Abdelwahab Hamou{-}Lhadj and
                  Mario Couture},
  title        = {Towards a formal framework for evaluating the effectiveness of system
                  diversity when applied to security},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291540},
  doi          = {10.1109/CISDA.2012.6291540},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KhouryHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LewisKPS12,
  author       = {David B. Lewis and
                  James M. Keller and
                  Mihail Popescu and
                  Kevin E. Stone},
  title        = {Dirt road segmentation using color and texture features in color imagery},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291522},
  doi          = {10.1109/CISDA.2012.6291522},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LewisKPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LoBN12,
  author       = {Nassirou Lo and
                  Jean Berger and
                  Martin No{\"{e}}l},
  title        = {Toward optimizing static target search path planning},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291538},
  doi          = {10.1109/CISDA.2012.6291538},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LoBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PopescuPSK12,
  author       = {Mihail Popescu and
                  Alex Paino and
                  Kevin E. Stone and
                  James M. Keller},
  title        = {Detection of buried objects in {FLIR} imaging using mathematical morphology
                  and {SVM}},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291520},
  doi          = {10.1109/CISDA.2012.6291520},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PopescuPSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Rempel12,
  author       = {Mark Rempel},
  title        = {Visualizing capability requirements in planning scenarios using Principal
                  Component Analysis},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291513},
  doi          = {10.1109/CISDA.2012.6291513},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Rempel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SampangiS12,
  author       = {Raghav V. Sampangi and
                  Srinivas Sampalli},
  title        = {Tag-server mutual authentication scheme based on gene transfer and
                  genetic mutation},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291533},
  doi          = {10.1109/CISDA.2012.6291533},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SampangiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SharmaBJBU12,
  author       = {Shiven Sharma and
                  Colin Bellinger and
                  Nathalie Japkowicz and
                  Rodney Berg and
                  R. Kurt Ungar},
  title        = {Anomaly detection in gamma ray spectra: {A} machine learning perspective},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291535},
  doi          = {10.1109/CISDA.2012.6291535},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/SharmaBJBU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SheltonAAVNDB12,
  author       = {Joseph Shelton and
                  Joshua Adams and
                  Aniesha Alford and
                  Melissa A. Venable and
                  Sabra Neal and
                  Gerry V. Dozier and
                  Kelvin S. Bryant},
  title        = {Mitigating replay attacks using Darwinian-based Feature Extraction},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291539},
  doi          = {10.1109/CISDA.2012.6291539},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SheltonAAVNDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SuiMS12,
  author       = {Guangye Sui and
                  Mohamed Mejri and
                  Hatem Ben Sta},
  title        = {{FASER} (Formal and Automatic Security Enforcement by Rewriting):
                  An algebraic approach},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291527},
  doi          = {10.1109/CISDA.2012.6291527},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SuiMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Torunski12,
  author       = {Eric Torunski},
  title        = {Cloud-based collaborative creation and simulation of courses of action:
                  Creation of a prototype web application using new {HTML5} features},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291528},
  doi          = {10.1109/CISDA.2012.6291528},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Torunski12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/XieKL12,
  author       = {Shengkun Xie and
                  Sridhar Krishnan and
                  Anna T. Lawniczak},
  title        = {Analysis of communication network surveillance using functional {ANOVA}
                  model with unequal variances},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291541},
  doi          = {10.1109/CISDA.2012.6291541},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/XieKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/YangQBW12,
  author       = {Fan Yang and
                  Qinru Qiu and
                  Morgan Bishop and
                  Qing Wu},
  title        = {Tag-assisted sentence confabulation for intelligent text recognition},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291521},
  doi          = {10.1109/CISDA.2012.6291521},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/YangQBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/YingT12,
  author       = {Hwei{-}Ming Ying and
                  Vrizlynn L. L. Thing},
  title        = {An enhanced intelligent forum crawler},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291523},
  doi          = {10.1109/CISDA.2012.6291523},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/YingT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhangLH12,
  author       = {Haopeng Zhang and
                  Zhenyi Liu and
                  Qing Hui},
  title        = {Optimal defense synthesis for jamming attacks in cognitive radio networks
                  via swarm optimization},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291525},
  doi          = {10.1109/CISDA.2012.6291525},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhangLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Zhu12,
  author       = {Xiaodan Zhu},
  title        = {Spotting keywords and sensing topic changes in speech},
  booktitle    = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISDA.2012.6291537},
  doi          = {10.1109/CISDA.2012.6291537},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/Zhu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2012,
  title        = {2012 {IEEE} Symposium on Computational Intelligence for Security and
                  Defence Applications, {CISDA} 2012, Ottawa, Canada, July 11-13, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6279634/proceeding},
  isbn         = {978-1-4673-1417-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ArndtZ11,
  author       = {Daniel J. Arndt and
                  Nur Zincir{-}Heywood},
  title        = {A Comparison of three machine learning techniques for encrypted network
                  traffic analysis},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {107--114},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945941},
  doi          = {10.1109/CISDA.2011.5945941},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/ArndtZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Barbaresco11,
  author       = {Fr{\'{e}}d{\'{e}}ric Barbaresco},
  title        = {Computation of most threatening radar trajectories areas and corridors
                  based on fast-marching {\&} Level Sets},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {51--58},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945944},
  doi          = {10.1109/CISDA.2011.5945944},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Barbaresco11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BellingerJ11,
  author       = {Colin Bellinger and
                  Nathalie Japkowicz},
  title        = {Motivating the inclusion of meteorological indicators in the {CTBT}
                  feature-space},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945945},
  doi          = {10.1109/CISDA.2011.5945945},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/BellingerJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Blouin11,
  author       = {St{\'{e}}phane Blouin},
  title        = {Accelerating Common Operational Pictures through network consensus},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {65--71},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945939},
  doi          = {10.1109/CISDA.2011.5945939},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/Blouin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BuckKSDB11,
  author       = {Andrew R. Buck and
                  James M. Keller and
                  Marjorie Skubic and
                  Marcin Detyniecki and
                  Thomas B{\"{a}}recke},
  title        = {Object set matching with an evolutionary algorithm},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {43--50},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945949},
  doi          = {10.1109/CISDA.2011.5945949},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BuckKSDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/CococcioniGR11,
  author       = {Marco Cococcioni and
                  Raffaele Grasso and
                  Michel Rixen},
  title        = {Rapid prototyping of high performance fuzzy computing applications
                  using high level {GPU} programming for maritime operations support},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {17--23},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945947},
  doi          = {10.1109/CISDA.2011.5945947},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/CococcioniGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GalwayPF11,
  author       = {David Galway and
                  Gerard Pieris and
                  Giovanni Fusina},
  title        = {Tasking system capabilities modeling using the complexity profile},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {102--106},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945950},
  doi          = {10.1109/CISDA.2011.5945950},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GalwayPF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LafondD11,
  author       = {Daniel Lafond and
                  Michel B. Ducharme},
  title        = {Complex decision making experimental platform {(CODEM):} {A} counter-insurgency
                  scenario},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945940},
  doi          = {10.1109/CISDA.2011.5945940},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LafondD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/McCarthyZ11,
  author       = {Curtis McCarthy and
                  Nur Zincir{-}Heywood},
  title        = {An investigation on identifying {SSL} traffic},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {115--122},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945943},
  doi          = {10.1109/CISDA.2011.5945943},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/McCarthyZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PestovP11,
  author       = {Irene Pestov and
                  Marcin L. Pilat},
  title        = {Modelling Search and Rescue systems with dynamical networks},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945953},
  doi          = {10.1109/CISDA.2011.5945953},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PestovP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SakrW11,
  author       = {Ziad Sakr and
                  Slawo Wesolkowski},
  title        = {Sensor network management using multiobjective evolutionary optimization},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {39--42},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945954},
  doi          = {10.1109/CISDA.2011.5945954},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SakrW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Strode11,
  author       = {Christopher Strode},
  title        = {Optimising multistatic sensor locations using path planning and game
                  theory},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945938},
  doi          = {10.1109/CISDA.2011.5945938},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Strode11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ThorntonFDB11,
  author       = {Chris Thornton and
                  Tom Flanagan and
                  J{\"{o}}rg Denzinger and
                  Jeffrey E. Boyd},
  title        = {Evaluating goal ordering structures for testing harbour security policies},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945937},
  doi          = {10.1109/CISDA.2011.5945937},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ThorntonFDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/VijverbergKW11,
  author       = {Julien A. Vijverberg and
                  Cornelis J. Koeleman and
                  Peter H. N. de With},
  title        = {Clustering of tracklets for on-line multi-target tracking in networked
                  camera systems},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {24--30},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945951},
  doi          = {10.1109/CISDA.2011.5945951},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/VijverbergKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/WojtaszekW11,
  author       = {Daniel T. Wojtaszek and
                  Slawo Wesolkowski},
  title        = {Multi-objective evolutionary optimization of a military air transportation
                  fleet mix with the flexibility objective},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {96--101},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945946},
  doi          = {10.1109/CISDA.2011.5945946},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/WojtaszekW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/XieL11,
  author       = {Shengkun Xie and
                  Anna T. Lawniczak},
  title        = {Detection of stationary network load increase using univariate network
                  aggregate traffic data by dynamic {PCA}},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {123--130},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945952},
  doi          = {10.1109/CISDA.2011.5945952},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/XieL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZengDLCHZ11,
  author       = {Fanchao Zeng and
                  James Decraene and
                  Malcolm Yoke Hean Low and
                  Wentong Cai and
                  Philip Hingston and
                  Suiping Zhou},
  title        = {High-dimensional objective-based data farming},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  pages        = {80--87},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CISDA.2011.5945942},
  doi          = {10.1109/CISDA.2011.5945942},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZengDLCHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2011,
  title        = {2011 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2011, Paris, France, April 15, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5937061/proceeding},
  isbn         = {978-1-4244-9941-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AkselrodTKDP09,
  author       = {David Akselrod and
                  Ratnasingham Tharmarasa and
                  Thia Kirubarajan and
                  Zhen Ding and
                  Tony Ponsford},
  title        = {Multisensor-multitarget tracking testbed},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356526},
  doi          = {10.1109/CISDA.2009.5356526},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AkselrodTKDP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AkujobiLK09,
  author       = {Frank Akujobi and
                  Ioannis Lambadaris and
                  Evangelos Kranakis},
  title        = {Detection of slow malicious worms using multi-sensor data fusion},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356557},
  doi          = {10.1109/CISDA.2009.5356557},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/AkujobiLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AlshammariZ09,
  author       = {Riyad Alshammari and
                  Nur Zincir{-}Heywood},
  title        = {Machine learning based encrypted traffic classification: Identifying
                  {SSH} and Skype},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356534},
  doi          = {10.1109/CISDA.2009.5356534},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/AlshammariZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AlsulaimanSVEG09,
  author       = {Fawaz A. Alsulaiman and
                  Nizar Sakr and
                  Julio J. Vald{\'{e}}s and
                  Abdulmotaleb El{-}Saddik and
                  Nicolas D. Georganas},
  title        = {Feature selection and classification in genetic programming: Application
                  to haptic-based biometric data},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356540},
  doi          = {10.1109/CISDA.2009.5356540},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/AlsulaimanSVEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BrownCHS09,
  author       = {Carson Brown and
                  Alex Cowperthwaite and
                  Abdulrahman Hijazi and
                  Anil Somayaji},
  title        = {Analysis of the 1999 DARPA/Lincoln Laboratory {IDS} evaluation data
                  with NetADHICT},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356522},
  doi          = {10.1109/CISDA.2009.5356522},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BrownCHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Calitoiu09,
  author       = {Dragos Calitoiu},
  title        = {New search algorithm for randomly located objects: {A} non-cooperative
                  agent based approach},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356564},
  doi          = {10.1109/CISDA.2009.5356564},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Calitoiu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ConnollyGS09,
  author       = {Jean{-}Fran{\c{c}}ois Connolly and
                  Eric Granger and
                  Robert Sabourin},
  title        = {Incremental adaptation of fuzzy {ARTMAP} neural networks for video-based
                  face classification},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356545},
  doi          = {10.1109/CISDA.2009.5356545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ConnollyGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DiesnerC09,
  author       = {Jana Diesner and
                  Kathleen M. Carley},
  title        = {He says, she says. Pat says, Tricia says. How much reference resolution
                  matters for entity extraction, relation extraction, and social network
                  analysis},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356530},
  doi          = {10.1109/CISDA.2009.5356530},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DiesnerC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DingL09,
  author       = {Zhen Ding and
                  Henry Leung},
  title        = {Bias phenomenon and analysis of a nonlinear transformation in a mobile
                  passive sensor network},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356558},
  doi          = {10.1109/CISDA.2009.5356558},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DingL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/EliasE09,
  author       = {Rimon Elias and
                  Amal Elnahas},
  title        = {Fast localization in indoor environments},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356553},
  doi          = {10.1109/CISDA.2009.5356553},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/EliasE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Elsaesser09,
  author       = {Derek Elsaesser},
  title        = {Emitter geolocation using low-accuracy direction-finding sensors},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356549},
  doi          = {10.1109/CISDA.2009.5356549},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Elsaesser09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ErsiT09,
  author       = {Ehsan Fazl Ersi and
                  John K. Tsotsos},
  title        = {Local feature analysis for robust face recognition},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356524},
  doi          = {10.1109/CISDA.2009.5356524},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ErsiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/FlanaganTD09,
  author       = {Tom Flanagan and
                  Chris Thornton and
                  J{\"{o}}rg Denzinger},
  title        = {Testing harbour patrol and interception policies using particle-swarm-based
                  learning of cooperative behavior},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356561},
  doi          = {10.1109/CISDA.2009.5356561},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/FlanaganTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/FrantzC09,
  author       = {Terrill L. Frantz and
                  Kathleen M. Carley},
  title        = {Information assurances and threat identification in networked organizations},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356532},
  doi          = {10.1109/CISDA.2009.5356532},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/FrantzC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GhanmiMBB09,
  author       = {Ahmed Ghanmi and
                  Alain Martel and
                  Jean Berger and
                  Abdeslem Boukhtouta},
  title        = {A framework for the design of a military operational supply network},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356523},
  doi          = {10.1109/CISDA.2009.5356523},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GhanmiMBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Gorodnichy09,
  author       = {Dmitry O. Gorodnichy},
  title        = {Evolution and evaluation of biometric systems},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356531},
  doi          = {10.1109/CISDA.2009.5356531},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Gorodnichy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GuoC09,
  author       = {Ruibiao J. Guo and
                  Brad Cain},
  title        = {Integrating reasoning with personality effects in simulated operators},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356538},
  doi          = {10.1109/CISDA.2009.5356538},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GuoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/IgnakovOL09,
  author       = {Dmitri Ignakov and
                  Galina Okouneva and
                  Guangjun Liu},
  title        = {Localization of door handle using a single camera on a door opening
                  mobile manipulator},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356543},
  doi          = {10.1109/CISDA.2009.5356543},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/IgnakovOL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KaluznySGK09,
  author       = {Bohdan Kaluzny and
                  R. H. A. David Shaw and
                  Ahmed Ghanmi and
                  Beomjoon Kim},
  title        = {An optimisation model for airlift load planning: Galahad and the quest
                  for the 'holy grail'},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356562},
  doi          = {10.1109/CISDA.2009.5356562},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KaluznySGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KannavaraB09,
  author       = {Raghudeep Kannavara and
                  Nikolaos G. Bourbakis},
  title        = {Iris biometric authentication based on local global graphs: An {FPGA}
                  implementation},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356550},
  doi          = {10.1109/CISDA.2009.5356550},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KannavaraB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KayackZHB09,
  author       = {Hilmi G{\"{u}}nes Kayacik and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood and
                  Stefan Burschka},
  title        = {Optimizing anomaly detector deployment under evolutionary black-box
                  vulnerability testing},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356546},
  doi          = {10.1109/CISDA.2009.5356546},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/KayackZHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KhreichGMS09,
  author       = {Wael Khreich and
                  Eric Granger and
                  Ali Miri and
                  Robert Sabourin},
  title        = {A comparison of techniques for on-line incremental learning of {HMM}
                  parameters in anomaly detection},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356542},
  doi          = {10.1109/CISDA.2009.5356542},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KhreichGMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KumarHG09,
  author       = {Amioy Kumar and
                  Madasu Hanmandlu and
                  H. M. Gupta},
  title        = {Online biometric authentication using hand vein patterns},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356554},
  doi          = {10.1109/CISDA.2009.5356554},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KumarHG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LaRocheZH09,
  author       = {Patrick LaRoche and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Evolving {TCP/IP} packets: {A} case study of port scans},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356541},
  doi          = {10.1109/CISDA.2009.5356541},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/LaRocheZH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LabatiPS09,
  author       = {Ruggero Donida Labati and
                  Vincenzo Piuri and
                  Fabio Scotti},
  title        = {Neural-based iterative approach for iris detection in iris recognition
                  systems},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356533},
  doi          = {10.1109/CISDA.2009.5356533},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/LabatiPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Labonte09,
  author       = {Gilles Labont{\'{e}}},
  title        = {Canadian artic Sovereignty: Local intervention by flocking UAVs},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356552},
  doi          = {10.1109/CISDA.2009.5356552},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Labonte09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LawniczakS009,
  author       = {Anna T. Lawniczak and
                  Bruno N. Di Stefano and
                  Hao Wu},
  title        = {Detection {\&} study of DDoS attacks via entropy in data network
                  models},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356521},
  doi          = {10.1109/CISDA.2009.5356521},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LawniczakS009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MartinS09,
  author       = {Trevor Martin and
                  Yun Shen},
  title        = {mTRACK - Monitoring time-varying relations in approximately categorised
                  knowledge},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356563},
  doi          = {10.1109/CISDA.2009.5356563},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MartinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MazurekW09,
  author       = {Michael Mazurek and
                  Slawomir Wesolkowski},
  title        = {Minimizing risk on a fleet mix problem with a multiobjective evolutionary
                  algorithm},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356525},
  doi          = {10.1109/CISDA.2009.5356525},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MazurekW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MonteroNSZ09,
  author       = {Andres Solis Montero and
                  Amiya Nayak and
                  Milos Stojmenovic and
                  Nejib Zaguia},
  title        = {Robust line extraction based on repeated segment directions on image
                  contours},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356556},
  doi          = {10.1109/CISDA.2009.5356556},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/MonteroNSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Moon09,
  author       = {Il{-}Chul Moon},
  title        = {Simulation analysis on destabilization of complex adaptive organizations},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356520},
  doi          = {10.1109/CISDA.2009.5356520},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Moon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MullenMBR09,
  author       = {Robert J. Mullen and
                  Dorothy Ndedi Monekosso and
                  Sarah A. Barman and
                  Paolo Remagnino},
  title        = {Autonomous control laws for mobile robotic surveillance swarms},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356555},
  doi          = {10.1109/CISDA.2009.5356555},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/MullenMBR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/PestovV09,
  author       = {Irene Pestov and
                  Simona Verga},
  title        = {Dynamical networks as a tool for system analysis and exploration},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356527},
  doi          = {10.1109/CISDA.2009.5356527},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/PestovV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/RhinelanderL09,
  author       = {Jason P. Rhinelander and
                  Peter X. Liu},
  title        = {Tracking a moving hypothesis for visual data with explicit switch
                  detection},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356547},
  doi          = {10.1109/CISDA.2009.5356547},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/RhinelanderL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/RongS09,
  author       = {Hai{-}Jun Rong and
                  Narasimhan Sundararajan},
  title        = {Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding
                  under actuator failures},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356559},
  doi          = {10.1109/CISDA.2009.5356559},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/RongS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SametM09,
  author       = {Saeed Samet and
                  Ali Miri},
  title        = {Secure two and multi-party association rule mining},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356544},
  doi          = {10.1109/CISDA.2009.5356544},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/SametM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SarunicEM09,
  author       = {Peter Sarunic and
                  Robin J. Evans and
                  William Moran},
  title        = {Control of unmanned aerial vehicles for passive detection and tracking
                  of multiple emitters},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356551},
  doi          = {10.1109/CISDA.2009.5356551},
  timestamp    = {Mon, 03 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/SarunicEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SlotCB09,
  author       = {Krzysztof Slot and
                  Jaroslaw Cichosz and
                  Lukasz Bronakowski},
  title        = {Application of voiced-speech variability descriptors to emotion recognition},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356537},
  doi          = {10.1109/CISDA.2009.5356537},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SlotCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/StirtzingerAM09,
  author       = {Anthony Stirtzinger and
                  Craig S. Anken and
                  Bruce McQueary},
  title        = {Goal-driven semi-automated generation of semantic models},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356518},
  doi          = {10.1109/CISDA.2009.5356518},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/StirtzingerAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SujitSP09,
  author       = {P. B. Sujit and
                  Jo{\~{a}}o Borges de Sousa and
                  Fernando M. Lobo Pereira},
  title        = {Multiple {UAV} teams for multiple tasks},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356535},
  doi          = {10.1109/CISDA.2009.5356535},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SujitSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SundaramRS09,
  author       = {Suresh Sundaram and
                  Hai{-}Jun Rong and
                  Narasimhan Sundararajan},
  title        = {Bio-inspired computing for launch vehicle design and trajectory optimization},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356548},
  doi          = {10.1109/CISDA.2009.5356548},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SundaramRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Suresh09,
  author       = {Suresh Suresh},
  title        = {Adaptive neural flight control system for helicopter},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356560},
  doi          = {10.1109/CISDA.2009.5356560},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Suresh09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TavallaeeBLG09,
  author       = {Mahbod Tavallaee and
                  Ebrahim Bagheri and
                  Wei Lu and
                  Ali A. Ghorbani},
  title        = {A detailed analysis of the {KDD} {CUP} 99 data set},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356528},
  doi          = {10.1109/CISDA.2009.5356528},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TavallaeeBLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TharmarasaKL09,
  author       = {Ratnasingham Tharmarasa and
                  Thia Kirubarajan and
                  Thomas Lang},
  title        = {Joint path planning and sensor subset selection for multistatic sensor
                  networks},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356539},
  doi          = {10.1109/CISDA.2009.5356539},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TharmarasaKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TharmarasaKM09,
  author       = {Ratnasingham Tharmarasa and
                  Thia Kirubarajan and
                  Michael McDonald},
  title        = {Passive multitarget tracking using transmitters of opportunity},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356536},
  doi          = {10.1109/CISDA.2009.5356536},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TharmarasaKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TrifiloBB09,
  author       = {Antonio Trifilo and
                  Stefan Burschka and
                  Ernst W. Biersack},
  title        = {Traffic to protocol reverse engineering},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356565},
  doi          = {10.1109/CISDA.2009.5356565},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TrifiloBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/UsmaniAK09,
  author       = {Zeeshan{-}ul{-}hassan Usmani and
                  Fawzi A. Alghamdi and
                  Daniel Kirk},
  title        = {BlastSim - Multi agent simulation of suicide bombing},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356529},
  doi          = {10.1109/CISDA.2009.5356529},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/UsmaniAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZamanK09,
  author       = {Safaa Zaman and
                  Fakhri Karray},
  title        = {Collaborative architecture for distributed intrusion detection system},
  booktitle    = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISDA.2009.5356567},
  doi          = {10.1109/CISDA.2009.5356567},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZamanK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2009,
  title        = {2009 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2009, Ottawa, Canada, July 8-10, 2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5351161/proceeding},
  isbn         = {978-1-4244-3764-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/0007LWZ07,
  author       = {Lin Wang and
                  Yongping Li and
                  Chengbo Wang and
                  Hongzhou Zhang},
  title        = {Face Recognition using Gaborface-based 2DPCA and (2D)\({}^{\mbox{2}}\)PCA
                  Classification with Ensemble and Multichannel Model},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368128},
  doi          = {10.1109/CISDA.2007.368128},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/0007LWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BarlowYA07,
  author       = {Michael Barlow and
                  Ang Yang and
                  Hussein A. Abbass},
  title        = {A Temporal Risk Assessment Framework for Planning {A} Future Force
                  Structure},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {100--107},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368141},
  doi          = {10.1109/CISDA.2007.368141},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BarlowYA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Benjamin07,
  author       = {David P. Benjamin},
  title        = {A Cognitive Approach to Intrusion Detection},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {161--168},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368149},
  doi          = {10.1109/CISDA.2007.368149},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Benjamin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ChaiW07,
  author       = {Huimin Chai and
                  Baoshu Wang},
  title        = {A Template-based Method for Force Group Classification in Situation
                  Assessment},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {85--91},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368139},
  doi          = {10.1109/CISDA.2007.368139},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ChaiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DePass07,
  author       = {Beth DePass},
  title        = {Next Generation End-To-End Logistics Decision Support Tools. Evolutionary
                  Logistics Planning},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {50--56},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368134},
  doi          = {10.1109/CISDA.2007.368134},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DePass07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DorisS07,
  author       = {Kenneth Doris and
                  David Silvia},
  title        = {Improved Missile Route Planning and Targeting using Game-Based Computational
                  Intelligence},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {63--68},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368136},
  doi          = {10.1109/CISDA.2007.368136},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DorisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GrimailaF07,
  author       = {Michael R. Grimaila and
                  Larry Fortson},
  title        = {Towards an Information Asset-Based Defensive Cyber Damage Assessment
                  Process},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {206--212},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368155},
  doi          = {10.1109/CISDA.2007.368155},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GrimailaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KananFH07,
  author       = {Hamidreza Rashidy Kanan and
                  Karim Faez and
                  Mehdi Hosseinzadeh Aghdam},
  title        = {Face Recognition System Using Ant Colony Optimization-Based Selected
                  Features},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368135},
  doi          = {10.1109/CISDA.2007.368135},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/KananFH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KansalAL07,
  author       = {Smriti Kansal and
                  Ashraf M. Abusharekh and
                  Alexander H. Levis},
  title        = {Computationally Derived Models of Adversary Organizations},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {92--99},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368140},
  doi          = {10.1109/CISDA.2007.368140},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KansalAL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KayacikZH07,
  author       = {Hilmi G{\"{u}}nes Kayacik and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Automatically Evading {IDS} Using {GP} Authored Attacks},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {153--160},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368148},
  doi          = {10.1109/CISDA.2007.368148},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/KayacikZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KleemanLHG07,
  author       = {Mark P. Kleeman and
                  Gary B. Lamont and
                  Kenneth M. Hopkinson and
                  Scott R. Graham},
  title        = {Solving Multicommodity Capacitated Network Design Problems using a
                  Multiobjective Evolutionary Algorithm},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {33--41},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368132},
  doi          = {10.1109/CISDA.2007.368132},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KleemanLHG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LongHJSM07,
  author       = {Lyle N. Long and
                  Scott D. Hanford and
                  Oranuj Janrathitikarn and
                  Greg L. Sinsley and
                  Jodi A. Miller},
  title        = {A Review of Intelligent Systems Software for Autonomous Vehicles},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368137},
  doi          = {10.1109/CISDA.2007.368137},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/LongHJSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MakanjuLZ07,
  author       = {Adetokunbo Makanju and
                  Patrick LaRoche and
                  Nur Zincir{-}Heywood},
  title        = {A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks
                  on WiFi Networks},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {213--219},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368156},
  doi          = {10.1109/CISDA.2007.368156},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/MakanjuLZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MartinAS07,
  author       = {Trevor Martin and
                  Ben Azvine and
                  Yun Shen},
  title        = {Computational Intelligence Support for Smart Queries and Adaptive
                  Data},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {77--84},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368138},
  doi          = {10.1109/CISDA.2007.368138},
  timestamp    = {Sat, 29 Apr 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MartinAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MoskovitchGPSGSE07,
  author       = {Robert Moskovitch and
                  Ido Gus and
                  Shay Pluderman and
                  Dima Stopel and
                  Chanan Glezer and
                  Yuval Shahar and
                  Yuval Elovici},
  title        = {Detection of Unknown Computer Worms Activity Based on Computer Behavior
                  using Data Mining},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {169--177},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368150},
  doi          = {10.1109/CISDA.2007.368150},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MoskovitchGPSGSE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NajgebauerATRKPW07,
  author       = {Andrzej Najgebauer and
                  Ryszard Antkiewicz and
                  Zbigniew Tarapata and
                  Jaroslaw Rulka and
                  Wojciech Kulas and
                  Dariusz Pierzchala and
                  Roman Wantoch{-}Rekowski},
  title        = {The Automation of Combat Decision Processes in the Simulation Based
                  Operational Training Support System},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {145--152},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368147},
  doi          = {10.1109/CISDA.2007.368147},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/NajgebauerATRKPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SinsleyMLGNH07,
  author       = {Gregory L. Sinsley and
                  Jodi A. Miller and
                  Lyle N. Long and
                  Brian R. Geiger and
                  Albert F. Niessner and
                  Joseph F. Horn},
  title        = {An Intelligent Controller for Collaborative Unmanned Air Vehicles},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368146},
  doi          = {10.1109/CISDA.2007.368146},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/SinsleyMLGNH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Srinoy07,
  author       = {Surat Srinoy},
  title        = {Intrusion Detection Model Based On Particle Swarm Optimization and
                  Support Vector Machine},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {186--192},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368152},
  doi          = {10.1109/CISDA.2007.368152},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Srinoy07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/StevensW07,
  author       = {Michael Stevens and
                  Paul D. Williams},
  title        = {Use of Trust Vectors for CyberCraft and the Limits of Usable Data
                  History for Trust Vectors},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {193--200},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368153},
  doi          = {10.1109/CISDA.2007.368153},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/StevensW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/TaylorSEDH07,
  author       = {Glenn Taylor and
                  Brian Stensrud and
                  Susan Eitelman and
                  Cory Dunham and
                  Echo A. Harger},
  title        = {Toward Automating Airspace Management},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {124--130},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368144},
  doi          = {10.1109/CISDA.2007.368144},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/TaylorSEDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/VanesianK07,
  author       = {Tasha Vanesian and
                  Kenneth Kreutz{-}Delgado},
  title        = {Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary
                  Computation},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {108--115},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368142},
  doi          = {10.1109/CISDA.2007.368142},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/VanesianK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/WagenhalsL07,
  author       = {Lee W. Wagenhals and
                  Alexander H. Levis},
  title        = {Course of Action Analysis in a Cultural Landscape Using Influence
                  Nets},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {116--123},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368143},
  doi          = {10.1109/CISDA.2007.368143},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/WagenhalsL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/WolfPOB07,
  author       = {Matt B. Wolf and
                  WonKyung Park and
                  Jae C. Oh and
                  Misty K. Blowers},
  title        = {Toward Open-Set Text-Independent Speaker Identification in Tactical
                  Communications},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368129},
  doi          = {10.1109/CISDA.2007.368129},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/WolfPOB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Wong07,
  author       = {Ted Wong},
  title        = {{ATR} Applications in Military Missions},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {30--32},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368131},
  doi          = {10.1109/CISDA.2007.368131},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Wong07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/WuQLBMF07,
  author       = {Qing Wu and
                  Qinru Qiu and
                  Richard W. Linderman and
                  Daniel J. Burns and
                  Michael J. Moore and
                  Dennis Fitzgerald},
  title        = {Architectural Design and Complexity Analysis of Large-Scale Cortical
                  Simulation on a Hybrid Computing Platform},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {201--205},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368154},
  doi          = {10.1109/CISDA.2007.368154},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/WuQLBMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZaidiL07,
  author       = {Abbas K. Zaidi and
                  Alexander H. Levis},
  title        = {Computational Verification of System Architectures},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368133},
  doi          = {10.1109/CISDA.2007.368133},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZaidiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhangW07,
  author       = {Like Zhang and
                  Gregory B. White},
  title        = {Anomaly Detection for Application Level Network Attacks Using Payload
                  Keywords},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {178--185},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368151},
  doi          = {10.1109/CISDA.2007.368151},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhengM07,
  author       = {Yuhua Zheng and
                  Yan Meng},
  title        = {The PSO-Based Adaptive Window for People Tracking},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {23--29},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368130},
  doi          = {10.1109/CISDA.2007.368130},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhengM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhouA07,
  author       = {Xiaowei Zhou and
                  Plamen P. Angelov},
  title        = {Autonomous Visual Self-localization in Completely Unknown Environment
                  using Evolving Fuzzy Rule-based Classifier},
  booktitle    = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  pages        = {131--138},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CISDA.2007.368145},
  doi          = {10.1109/CISDA.2007.368145},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhouA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2007,
  title        = {2007 {IEEE} Symposium on Computational Intelligence in Security and
                  Defense Applications, {CISDA} 2007, Honolulu, Hawaii, USA, April 1-5,
                  2007},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4219070/proceeding},
  isbn         = {1-4244-0700-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics