


default search action
CISDA 2014: Cau Giay, Vietnam
- Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2014, Cau Giay, Vietnam, December 14-17, 2014. IEEE 2014, ISBN 978-1-4799-5431-5

- Pawat Chusilp, Weerawut Charubhun, Otsin Nilubol:

Effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness. 1-7 - Thi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen:

Malware detection using genetic programming. 1-6 - Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:

Intrusion detection system using Discrete Fourier Transform. 1-5 - Viet-Chau Dang, Masao Kubo, Hiroshi Sato, Akihiro Yamaguchi, Akira Namatame:

A simple braking model for detecting incidents locations by smartphones. 1-5 - Thai-Thinh Dang

, Trong Hai Duong, Hong Son Nguyen:
A hybrid framework for enhancing correlation to solve cold-start problem in recommender systems. 1-5 - Shayan Kavakeb, Trung Thanh Nguyen

, Mohamed Benmerikhi, Zaili Yang
, Ian Jenkinson:
An improved memetic algorithm to enhance the sustainability and reliability of transport in container terminals. 1-8 - Quan Dang Dinh, Quang-Anh Tran, Frank Jiang:

Automated generation of ham rules for Vietnamese spam filtering. 1-5 - Cao Huu Tinh

, Vu Hoa Tien, Nguyen Cong Dinh, Ngoc Anh Mai
:
Design of Takagi-Sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jet. 1-7 - Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu:

Behavior-driven video analytics system for critical infrastructure protection. 1-8 - Nguyen Hoai Anh:

A multi-objective method for discovery of pathways in protein-protein interaction networks. 1-7 - Eduard Avedyan, Alexander I. Galushkin, Dmitry V. Pantiukhin

:
Neural network technologies for information systems security. 1-5 - Vincent Barnabe-Lortie, Colin Bellinger, Nathalie Japkowicz

:
Smoothing gamma ray spectra to improve outlier detection. 1-8 - Long Nguyen, Anh Quang Tran, Lam Thu Bui

:
DMEA-II and its application on spam email detection problems. 1-6 - Ngoc Tran Nguyen

:
An efficient LBP-based descriptor for real-time object detection. 1-5 - Mau Uyen Nguyen

, Thanh Tinh Dao, Long Thanh Ngo
:
A fuzzy-based approach for approximating depth information in RGB-D images. 1-5 - Dung H. Phan, Junichi Suzuki:

R2-BEAN: R2 indicator based evolutionary algorithm for noisy multiobjective optimization. 1-8 - Bao Nguyen, Md. Suruz Miah

:
Analysis of maritime air defence scenarios. 1-8 - Md. Suruz Miah

, Bao Nguyen, Davide Spinello, Wail Gueaieb:
Maritime air defence firing tactics. 1-9 - Minh Hoang Trinh

, Kwang-Kyo Oh, Hyo-Sung Ahn
:
Control of a mobile agent using only bearing measurements in triangular region. 1-5 - Rafael Falcon, Rami S. Abielmona, Sean Billings, Alex Plachkov, Hussein A. Abbass

:
Risk management with hard-soft data fusion in maritime domain awareness. 1-8 - Nguyen Van Nhuong, Vo Thi Yen Nhi, Cam Nguyen Tan, Phu Xuan Mai

, Tan Cao Dang:
SSSM-semantic set and string matching based malware detection. 1-6 - Nguyen Manh Hung, Vu Duy Nhat:

B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. 1-6 - Eleni Petraki, Hussein A. Abbass

:
On trust and influence: A computational red teaming game theoretic perspective. 1-7 - Hoang Anh Q. Tran, Akira Namatame, Augie Widyotriatmo, Endra Joelianto

:
An optimization procedure for enhancing network robustness against cascading failures. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














