


default search action
Intelligent Methods for Cyber Warfare 2015
- Ronald R. Yager, Marek Z. Reformat, Naif Alajlan:

Intelligent Methods for Cyber Warfare. Studies in Computational Intelligence 563, Springer 2015, ISBN 978-3-319-08623-1 - Charles LeDoux, Arun Lakhotia:

Malware and Machine Learning. 1-42 - Dan E. Tamir, Naphtali David Rishe

, Mark Last, Abraham Kandel:
Soft Computing Based Epidemical Crisis Prediction. 43-67 - Fei-Yue Wang, Xiaochen Li, Wenji Mao:

An ACP-Based Approach to Intelligence and Security Informatics. 69-86 - Oleg Chertov

, Dan Tavrov
:
Microfiles as a Potential Source of Confidential Information Leakage. 87-114 - Daniel Ortiz Arroyo

:
Decision Support in Open Source Intelligence. 115-127 - James Llinas:

Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype. 129-149 - Robin Wikström

, József Mezei
:
Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures. 151-172 - Gulshan Kumar

, Krishan Kumar
:
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. 173-200 - Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu:

Cyber Insider Mission Detection for Situation Awareness. 201-217 - Allen Ott, Alex Moir, John T. Rickard:

A Game Theoretic Engine for Cyber Warfare. 219-237 - Jared Holsopple, Shanchieh Jay Yang, Moises Sudit:

Mission Impact Assessment for Cyber Warfare. 239-266 - Suchitra Abel:

Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. 267-278

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














