


default search action
1. BLISS 2007: Edingburgh, Scotland, UK
- Adrian Stoica, Tughrul Arslan, Daniel Howard, Tai-Hoon Kim, Ahmed O. El-Rayis:

2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007, Edinburgh, United Kingdom, 9-10 August 2007. IEEE Computer Society 2007, ISBN 0-7695-2919-4
Biometrics
- Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark Robinson, Colin Tredoux, Jo Park, Alex H. McIntyre, Peter J. B. Hancock:

Evolving the Face of a Criminal: How to Search a Face Space More Effectively. 3-10 - Vlad P. Shmerko, Svetlana N. Yanushkevich

, Hyunsuk Moon, Adrian Stoica, Ronald R. Yager:
Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures. 11-14 - Khalil Zebbiche

, Fouad Khelifi
, Ahmed Bouridane:
Maximum-Likelihood Watermarking Detection on Fingerprint Images. 15-18 - Martin Drahanský:

Sinusoidal Shape of a Papillary Line Crosscut. 19-24
Cyber Security
- Tai-Hoon Kim, Seoksoo Kim, Gilcheol Park:

Block Model Application for Decision Support Systems. 25-28 - Hak-Man Kim, Dong-Joo Kang, Tai-Hoon Kim:

Flexible Key Distribution for SCADA Network using Multi-Agent System. 29-34 - Chul Sur, Chae Duk Jung, Kyung Hyune Rhee:

Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption. 35-40 - Youngho Park, Won-Young Lee, Kyung Hyune Rhee:

Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution. 41-46 - Haeng-Kon Kim:

Frameworks of Indexing Mechanism for Mobile Devices. 47-50 - Wenmao Zhang, Jun Bi, Jianping Wu, Zheng Qin:

An Approach to Optimize Local Trust Algorithm in SureMsg Service. 51-54 - Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak:

A Practical Proxy Device for Protecting RFID Tag's Identifier. 55-58 - Kun Lin, Lin Yuan, Gang Qu:

SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. 59-64
Sensor Networks
- Siti Yuhaniz, Tanya Vladimirova, Scott Gleason

:
An Intelligent Decision-Making System for Flood Monitoring from Space. 65-71 - Erfu Yang

, Ahmet T. Erdogan
, Tughrul Arslan, Nick Barton:
Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. 72-75 - Erfu Yang

, Ahmet T. Erdogan
, Tughrul Arslan, Nick Barton:
An Improved Particle Swarm Optimization Algorithm for Power-Efficient Wireless Sensor Networks. 76-82
Adaptive Technqiues for Security
- Nikolaos G. Bartzoudis

, Klaus D. McDonald-Maier
:
An adaptive processing node architecture for validating sensors reliability in a wind farm. 83-86 - Jim Tørresen, Kyrre Glette:

Making Hardware Soft in Intelligent Systems. 87-90 - H. J. Kadim:

Modelling of Anticipatory Behaviour for Self-Control and Adaptability with Applications to Autonomous Systems. 91-96
Image and Signal Processing Techniques
- Daniel Howard, Joseph Kolibal:

Image Analysis by Means of the Stochastic Matrix Method of Function Recovery. 97-101 - Oana Muntean, Mihai Oltean

:
Processing Bank Checks with Genetic Programming and Histograms. 102-105 - Walid Riad Boukabou, Ahmed Bouridane:

An Improved LDA Approach with DFB Preprocessing for Face Recognition. 106-110 - Konstantinos Sirlantzis

, W. Gareth J. Howells, Toby Lloyd-Jones, Michael C. Fairhurst:
A Multi-Classifier Approach to Modelling Human and Automatic Visual Cognition. 111-114 - W. Gareth J. Howells, Klaus D. McDonald-Maier

, T. Binzegger, M. P. Young:
MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System. 115-118 - Turgay Temel, Nizamettin Aydin:

A Threshold Free Clustering Algorithm for Robust Unsupervised Classification. 119-122
Emerging Areas in Security Research
- A. Ian Thompson, Ahmed Bouridane, Fatih Kurugollu:

Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Domain. 123-132 - Wael Adi, Bassel Soudan:

Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification. 133-136 - Andrew B. T. Hopkins, Klaus D. McDonald-Maier

, W. Gareth J. Howells, Ahmet T. Erdogan
, Tughrul Arslan:
I2S3 the Integrated Intelligent Secure Sensor Systems Project. 137-140 - Lukás Sekanina, Tomas Hruska, Tomás Vojnar, Dusan Kolár, Jan Cernocký:

On Some Directions in Security-Oriented Research. 141-144 - Mircea Gh. Negoita:

Artificial Immune Systems -- an Emergent Technology Performing the Defence of Complex Systems. 145-150
Biological, Chemical, and Medical Applications
- Sue Ellen Haupt, Randy L. Haupt, George S. Young:

Using Genetic Algorithms in Chem-Bio Defense Applications. 151-154 - H. J. Kadim, Christopher M. Wood:

Prediction of Protein Conformation with Potential Applications to Medical Diagnosis and Defence. 155-158 - Adem Karahoca, Turkalp Kucur, Nizamettin Aydin:

Data Mining Usage in Emboli Detection. 159-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














