The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for defense with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1967 (19) 1968-1974 (15) 1975-1978 (16) 1979-1980 (16) 1981-1982 (15) 1983-1985 (23) 1986-1987 (21) 1988-1989 (26) 1990-1991 (29) 1992-1993 (19) 1994-1995 (29) 1996 (25) 1997 (29) 1998 (23) 1999 (32) 2000 (42) 2001 (51) 2002 (63) 2003 (103) 2004 (141) 2005 (200) 2006 (227) 2007 (272) 2008 (256) 2009 (239) 2010 (137) 2011 (185) 2012 (164) 2013 (187) 2014 (271) 2015 (230) 2016 (257) 2017 (284) 2018 (342) 2019 (493) 2020 (524) 2021 (561) 2022 (640) 2023 (701) 2024 (183)
Publication types (Num. hits)
article(2799) book(18) data(2) incollection(161) inproceedings(4022) phdthesis(56) proceedings(32)
Venues (Conferences, Journals, ...)
CoRR(785) CISDA(168) MTD@CCS(118) STIDS(110) IEEE Access(98) Comput. Secur.(66) WSC(60) HICSS(58) IEEE Trans. Inf. Forensics Sec...(52) ICC(43) GLOBECOM(42) MICRADS(42) CCS(40) ACSAC(39) Synth.(37) Secur. Commun. Networks(34) More (+10 of total 1943)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1548 occurrences of 955 keywords

Results
Found 7091 publication records. Showing 7090 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich A layered decision model for cost-effective network defense. Search on Bibsonomy IRI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song Design space and analysis of worm defense strategies. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation
73Jelena Mirkovic, Max Robinson, Peter L. Reiher Alliance formation for DDoS defense. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
66Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 Distributed Defense Against Distributed Denial-of-Service Attacks. Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Toby Ehrenkranz, Jun Li 0001 On the state of IP spoofing defense. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spoofing defense, spoofing packet, packet filtering, IP spoofing
62Igor V. Kotenko, Alexander Ulanov Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. Search on Bibsonomy AIS-ADM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptation and learning in multi-agent systems, security simulation, network attacks and defense, applications
62Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
59Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong Adaptive Defense Against Various Network Attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
55David Bénichou, Serge Lefranc Introduction to Network Self-defense: technical and judicial issues. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network self defense, Retaliation, Response intrusion, Legal issues
52Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke Rationality Validation of a Layered Decision Model for Network Defense. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Feng Zhang, Zhiguang Qin, Shijie Zhou Policy-Tree Based Proactive Defense Model for Network Security. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Yichuan Jiang, YiPing Zhong, Shiyong Zhang A Topology-Adapted Network Defense Model Based on Mobile Agent. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Dave McMahon Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security. Search on Bibsonomy Best Practices in Computer Network Defense The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
48Junfeng Tian, Min Peng, Yuling Liu A New Active DDoS Defense System Based on Automatic Learning. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active defense, neural network, statistical analysis, DDoS, traffic monitoring
45Igor V. Kotenko, Alexander Ulanov Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cooperative distributed defence, Simulation, DDoS, Network attacks
45Igor V. Kotenko, Alexander Ulanov Simulation of Internet DDoS Attacks and Defense. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security
45Eunmi Ham, Woojin Paik Identifying Text Discourse Structure of the Narratives Describing Psychiatric Patients' Defense Mechanisms. Search on Bibsonomy FinTAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Zhongwen Li, Yang Xiang 0001, Dongsheng He Simulation and Analysis of DDoS in Active Defense Environment. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Yanxiang He, Wei Chen 0006, Wenling Peng, Bin Xiao 0001 An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Mihui Kim, Kijoon Chae A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Wei Jiang, Binxing Fang, Hongli Zhang 0001, Zhihong Tian, Xin-fang Song Optimal Network Security Strengthening Using Attack-Defense Game Model. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security Strengthening, Defense Graph, Attack-Defense Game, Internet Security, Cost metrics
43Defense Advanced Research Projects Agency IAB official protocol standards. Search on Bibsonomy RFC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
43Defense Advanced Research Projects Agency IAB official protocol standards. Search on Bibsonomy RFC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
43Defense Advanced Research Projects Agency IAB official protocol standards. Search on Bibsonomy RFC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
43Defense Advanced Research Projects Agency IAB official protocol standards. Search on Bibsonomy RFC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
43Defense Advanced Research Projects Agency Ethics and the Internet. Search on Bibsonomy RFC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
43Defense Advanced Research Projects Agency IAB official protocol standards. Search on Bibsonomy RFC The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
43Benjamin W. Priest, George Cybenko, Satinder Singh 0001, Massimiliano Albanese, Peng Liu 0005 Online and Scalable Adaptive Cyber Defense. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
43Michael P. Wellman, Thanh Hong Nguyen, Mason Wright Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
43Zhisheng Hu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
43Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko Moving Target Defense Quantification. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
43 Recent Advances in Computational Intelligence in Defense and Security. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
43Andrea Rigoni, Gustav Lindstrom Computer Network Defense: New Threats and Trends. Search on Bibsonomy Best Practices in Computer Network Defense The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
43Elly van den Heuvel, Gerben Klein Baltink Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond. Search on Bibsonomy Best Practices in Computer Network Defense The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
43Ang Cui, Salvatore J. Stolfo Symbiotes and defensive Mutualism: Moving Target Defense. Search on Bibsonomy Moving Target Defense The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
43Ehab Al-Shaer Toward Network Configuration Randomization for Moving Target Defense. Search on Bibsonomy Moving Target Defense The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
43Georgios Portokalidis, Angelos D. Keromytis Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. Search on Bibsonomy Moving Target Defense The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
43Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
43Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
41John P. McDermott, R. Gelinas, S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare
41Leigh Flagg, Gordon Streeter, Andrew Potter Bringing knowledge to network defense. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF cyber defense training, decision support, situational awareness, network-centric warfare
41Martin R. Stytz Considering Defense in Depth for Software Applications. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF defense-in-depth, software development, software tools, attack, software security
38Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove An analysis of social network-based Sybil defenses. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social network-based Sybil defense, communities, social networks, sybil attacks
38Frederick I. Moxley On the specification of complex software systems. Search on Bibsonomy ICECCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification
38Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma 0010 The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Sharon Bewick, Mingjun Zhang, William R. Hamel, Ruoting Yang Passive vs. aggressive strategies: A game theoretic analysis of military defense. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Wei Jiang, Zhihong Tian, Hongli Zhang 0001, Xin-fang Song A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Gregory Levitin Optimal Defense Strategy Against Intentional Attacks. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Raman Sharykin, Phillip A. Porras Applying Formal Evaluation to Worm Defense Design. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin Apply Data Mining to Defense-in-Depth Network Security System. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan A Defense-Centric Taxonomy Based on Attack Manifestations. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Wojciech Jamroga A Defense Model for Games with Incomplete Information. Search on Bibsonomy KI/ÖGAI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Tuncer I. Ören, Susan K. Numrich, Adelinde M. Uhrmacher, Linda F. Wilson, Erol Gelenbe Agent-directed simulation: challenges to meet defense and civilian requirements. Search on Bibsonomy WSC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou How Many Attackers Can Selfish Defenders Catch? Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Mihui Kim, Jaewon Seo, Kijoon Chae Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. Search on Bibsonomy SEUS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga A Framework for Conceptualizing Social Engineering Attacks. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF system archetype, pattern recognition, information security, system dynamics, critical infrastructure, Social engineering
35Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher DefCOM: Defensive Cooperative Overlay Mesh. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35B. A. Batchelder ADAM (Attrition Damage Assessment Model. Search on Bibsonomy Commun. ACM The full citation details ... 1961 DBLP  DOI  BibTeX  RDF weapons effectiveness, programming, Monte Carlo method, computer simulation, computer application
34William W. Agresti The Four Forces Shaping Cybersecurity. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Reconnaissance fingerprinting, Network defense, Security Cybersecurity, Cyberterrorists, Rebranding, National defense, Information technology
34Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena BitBlaze: A New Approach to Computer Security via Binary Analysis. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis
34Jeffrey A. Mattson Cyber Defense Exercise: A Service Provider Model. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber Defense Exercise, Training Information Assurance Professionals, Information Security Education
34Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu Port and Address Hopping for Active Cyber-Defense. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping
34Duminda Wijesekera, James Bret Michael, Anil Nerode An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ballistic Missile Defense Policy, Agents
34Michael V. Capps, Perry McDowell, Michael Zyda A Future for Entertainment-Defense Research Collaboration. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Defense and entertainment collaboration, virtual environments and simulation, modeling, networks, interactive entertainment
33Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33George Cybenko, Michael P. Wellman, Peng Liu 0005, Minghui Zhu Overview of Control and Game Theory in Adaptive Cyber Defenses. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen Adaptive Cyber Defenses for Botnet Detection and Mitigation. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis Control-Theoretic Approaches to Cyber-Security. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu 0005 MTD Techniques for Memory Protection Against Zero-Day Attacks. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
33Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Eduardo Vellasques, Robert Sabourin, Eric Granger A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Diana Inkpen Text Mining in Social Media for Security Threats. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Catherine Cheung, Julio J. Valdés, Jobin Puthuparampil Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Francesco Flammini, Stefano Marrone 0001, Nicola Mazzocca, Valeria Vittorini Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Marco Cococcioni mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Julio J. Valdés, Fawaz A. Alsulaiman, Abdulmotaleb El-Saddik Visualization of Handwritten Signatures Based on Haptic Information. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Gonzalo Nápoles, Isel Grau, Rafael Falcon, Rafael Bello 0001, Koen Vanhoof A Granular Intrusion Detection System Using Rough Cognitive Networks. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Paloma de las Cuevas, Zeineb Chelly, Antonio Miguel Mora, Juan Julián Merelo Guervós, Anna Isabel Esparcia-Alcázar An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Boris Kovalerchuk, Leonid I. Perlovsky Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Shawn Eastwood, Svetlana N. Yanushkevich Risk Assessment in Authentication Machines. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Bindu Madhavi Padmanabhuni, Kartick Subramanian, Suresh Sundaram 0002 Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu Classification-Driven Video Analytics for Critical Infrastructure Protection. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33D. Vijay Rao Design and Development of Intelligent Military Training Systems and Wargames. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Fátima Barceló-Rico, Anna Isabel Esparcia-Alcázar, Antonio Villalón-Huerta Semi-Supervised Classification System for the Detection of Advanced Persistent Threats. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Mark G. Ball, Blerim Qela, Slawomir Wesolkowski A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33David Bissessar, Carlisle Adams, Alex Stoianov Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Stuart H. Rubin, Thouraya Bouabana-Tebibel NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Timothy C. Havens, Derek T. Anderson, Kevin E. Stone, John Becker, Anthony J. Pinar Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Francesca De Simio, Marco Tesei, Roberto Setola Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Jillian Morgan, Nur Zincir-Heywood, John T. Jacobs A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Kun Wang 0009, Eleni Petraki, Hussein A. Abbass Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Sansanee Auephanwiriyakul, Yutthana Munklang, Nipon Theera-Umpon Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Ivan Jordanov, Nedyalko Petrov Intelligent Radar Signal Recognition and Classification. Search on Bibsonomy Recent Advances in Computational Intelligence in Defense and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Gabriel Jakobson Mission Resilience. Search on Bibsonomy Cyber Defense and Situational Awareness The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 7090 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license