


default search action
CISDA 2007: Honolulu, Hawaii, USA
- 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007, Honolulu, Hawaii, USA, April 1-5, 2007. IEEE 2007, ISBN 1-4244-0700-1

- Lin Wang, Yongping Li, Chengbo Wang, Hongzhou Zhang:

Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model. 1-6 - Matt B. Wolf, WonKyung Park, Jae C. Oh

, Misty K. Blowers:
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications. 7-14 - Yuhua Zheng, Yan Meng:

The PSO-Based Adaptive Window for People Tracking. 23-29 - Ted Wong:

ATR Applications in Military Missions. 30-32 - Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham

:
Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm. 33-41 - Abbas K. Zaidi, Alexander H. Levis:

Computational Verification of System Architectures. 42-49 - Beth DePass:

Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning. 50-56 - Hamidreza Rashidy Kanan, Karim Faez, Mehdi Hosseinzadeh Aghdam

:
Face Recognition System Using Ant Colony Optimization-Based Selected Features. 57-62 - Kenneth Doris, David Silvia:

Improved Missile Route Planning and Targeting using Game-Based Computational Intelligence. 63-68 - Lyle N. Long, Scott D. Hanford, Oranuj Janrathitikarn, Greg L. Sinsley

, Jodi A. Miller:
A Review of Intelligent Systems Software for Autonomous Vehicles. 69-76 - Trevor Martin, Ben Azvine, Yun Shen:

Computational Intelligence Support for Smart Queries and Adaptive Data. 77-84 - Huimin Chai, Baoshu Wang:

A Template-based Method for Force Group Classification in Situation Assessment. 85-91 - Smriti Kansal, Ashraf M. Abusharekh, Alexander H. Levis:

Computationally Derived Models of Adversary Organizations. 92-99 - Michael Barlow, Ang Yang, Hussein A. Abbass

:
A Temporal Risk Assessment Framework for Planning A Future Force Structure. 100-107 - Tasha Vanesian, Kenneth Kreutz-Delgado:

Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation. 108-115 - Lee W. Wagenhals, Alexander H. Levis:

Course of Action Analysis in a Cultural Landscape Using Influence Nets. 116-123 - Glenn Taylor, Brian Stensrud, Susan Eitelman, Cory Dunham, Echo A. Harger:

Toward Automating Airspace Management. 124-130 - Xiaowei Zhou, Plamen Angelov

:
Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier. 131-138 - Gregory L. Sinsley

, Jodi A. Miller, Lyle N. Long, Brian R. Geiger, Albert F. Niessner, Joseph F. Horn:
An Intelligent Controller for Collaborative Unmanned Air Vehicles. 139-144 - Andrzej Najgebauer

, Ryszard Antkiewicz, Zbigniew Tarapata
, Jaroslaw Rulka, Wojciech Kulas
, Dariusz Pierzchala
, Roman Wantoch-Rekowski:
The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System. 145-152 - Hilmi Günes Kayacik, Nur Zincir-Heywood

, Malcolm I. Heywood
:
Automatically Evading IDS Using GP Authored Attacks. 153-160 - David P. Benjamin:

A Cognitive Approach to Intrusion Detection. 161-168 - Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer

, Yuval Shahar
, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. 169-177 - Like Zhang, Gregory B. White:

Anomaly Detection for Application Level Network Attacks Using Payload Keywords. 178-185 - Surat Srinoy:

Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine. 186-192 - Michael Stevens, Paul D. Williams:

Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors. 193-200 - Qing Wu, Qinru Qiu, Richard W. Linderman, Daniel J. Burns, Michael J. Moore, Dennis Fitzgerald:

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform. 201-205 - Michael R. Grimaila, Larry Fortson:

Towards an Information Asset-Based Defensive Cyber Damage Assessment Process. 206-212 - Adetokunbo Makanju, Patrick LaRoche, Nur Zincir-Heywood

:
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks. 213-219

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














