|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1548 occurrences of 955 keywords
|
|
|
Results
Found 7091 publication records. Showing 7090 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich |
A layered decision model for cost-effective network defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, USA, pp. 506-511, 2005, IEEE Systems, Man, and Cybernetics Society, 0-7803-9093-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
Design space and analysis of worm defense strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 125-137, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation |
73 | Jelena Mirkovic, Max Robinson, Peter L. Reiher |
Alliance formation for DDoS defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 11-18, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
66 | Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 |
Distributed Defense Against Distributed Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings, pp. 357-362, 2005, Springer, 3-540-29235-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Toby Ehrenkranz, Jun Li 0001 |
On the state of IP spoofing defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 9(2), pp. 6:1-6:29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spoofing defense, spoofing packet, packet filtering, IP spoofing |
62 | Igor V. Kotenko, Alexander Ulanov |
Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS-ADM ![In: Autonomous Intelligent Systems: Multi-Agents and Data Mining, Second International Workshop, AIS-ADM 2007, St. Petersburg, Russia, June 3-5, 2007, Proceedings, pp. 212-228, 2007, Springer, 978-3-540-72838-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
adaptation and learning in multi-agent systems, security simulation, network attacks and defense, applications |
62 | Ying Xu, Roch Guérin |
On the robustness of router-based denial-of-service (DoS) defense systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 35(3), pp. 47-60, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
router-based defense, denial-of-service |
59 | Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong |
Adaptive Defense Against Various Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(10), pp. 1877-1888, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 217-228, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
55 | David Bénichou, Serge Lefranc |
Introduction to Network Self-defense: technical and judicial issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 1(1-2), pp. 24-31, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network self defense, Retaliation, Response intrusion, Legal issues |
52 | Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke |
Rationality Validation of a Layered Decision Model for Network Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 85-90, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Feng Zhang, Zhiguang Qin, Shijie Zhou |
Policy-Tree Based Proactive Defense Model for Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 437-449, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Yichuan Jiang, YiPing Zhong, Shiyong Zhang |
A Topology-Adapted Network Defense Model Based on Mobile Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 335-342, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Dave McMahon |
Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Best Practices in Computer Network Defense ![In: Best Practices in Computer Network Defense: Incident Detection and Response, pp. 43-53, 2014, IOS Press, 978-1-61499-371-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
48 | Junfeng Tian, Min Peng, Yuling Liu |
A New Active DDoS Defense System Based on Automatic Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2005, Data Management on the Web, 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings, pp. 249-250, 2005, Springer, 3-540-30767-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
active defense, neural network, statistical analysis, DDoS, traffic monitoring |
45 | Igor V. Kotenko, Alexander Ulanov |
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 565-572, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cooperative distributed defence, Simulation, DDoS, Network attacks |
45 | Igor V. Kotenko, Alexander Ulanov |
Simulation of Internet DDoS Attacks and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 327-342, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security |
45 | Eunmi Ham, Woojin Paik |
Identifying Text Discourse Structure of the Narratives Describing Psychiatric Patients' Defense Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FinTAL ![In: Advances in Natural Language Processing, 5th International Conference on NLP, FinTAL 2006, Turku, Finland, August 23-25, 2006, Proceedings, pp. 341-348, 2006, Springer, 3-540-37334-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Zhongwen Li, Yang Xiang 0001, Dongsheng He |
Simulation and Analysis of DDoS in Active Defense Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 878-886, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Yanxiang He, Wei Chen 0006, Wenling Peng, Bin Xiao 0001 |
An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 265-269, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Mihui Kim, Kijoon Chae |
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 843-852, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Wei Jiang, Binxing Fang, Hongli Zhang 0001, Zhihong Tian, Xin-fang Song |
Optimal Network Security Strengthening Using Attack-Defense Game Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 475-480, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security Strengthening, Defense Graph, Attack-Defense Game, Internet Security, Cost metrics |
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1200, pp. 1-31, April 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1140, pp. 1-27, May 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1100, pp. 1-14, April 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1130, pp. 1-17, October 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
Ethics and the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1087, pp. 1-2, January 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
43 | Defense Advanced Research Projects Agency |
IAB official protocol standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1083, pp. 1-12, December 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
43 | Benjamin W. Priest, George Cybenko, Satinder Singh 0001, Massimiliano Albanese, Peng Liu 0005 |
Online and Scalable Adaptive Cyber Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 232-261, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Michael P. Wellman, Thanh Hong Nguyen, Mason Wright |
Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 112-128, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Zhisheng Hu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 |
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 54-93, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko |
Moving Target Defense Quantification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 94-111, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | |
Recent Advances in Computational Intelligence in Defense and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 1-9, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Andrea Rigoni, Gustav Lindstrom |
Computer Network Defense: New Threats and Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Best Practices in Computer Network Defense ![In: Best Practices in Computer Network Defense: Incident Detection and Response, pp. 19-29, 2014, IOS Press, 978-1-61499-371-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Elly van den Heuvel, Gerben Klein Baltink |
Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Best Practices in Computer Network Defense ![In: Best Practices in Computer Network Defense: Incident Detection and Response, pp. 118-129, 2014, IOS Press, 978-1-61499-371-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Ang Cui, Salvatore J. Stolfo |
Symbiotes and defensive Mutualism: Moving Target Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Moving Target Defense ![In: Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, pp. 99-108, 2011, Springer, 978-1-4614-0976-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Ehab Al-Shaer |
Toward Network Configuration Randomization for Moving Target Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Moving Target Defense ![In: Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, pp. 153-159, 2011, Springer, 978-1-4614-0976-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Georgios Portokalidis, Angelos D. Keromytis |
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Moving Target Defense ![In: Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, pp. 49-76, 2011, Springer, 978-1-4614-0976-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel |
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Attack Detection and Defense ![In: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008, 2008, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov |
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Attack Detection and Defense ![In: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008, 2008, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
41 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 265-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
41 | Leigh Flagg, Gordon Streeter, Andrew Potter |
Bringing knowledge to network defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 370-377, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
cyber defense training, decision support, situational awareness, network-centric warfare |
41 | Martin R. Stytz |
Considering Defense in Depth for Software Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(1), pp. 72-75, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
defense-in-depth, software development, software tools, attack, software security |
38 | Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove |
An analysis of social network-based Sybil defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 363-374, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social network-based Sybil defense, communities, social networks, sybil attacks |
38 | Frederick I. Moxley |
On the specification of complex software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 134-138, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification |
38 | Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma 0010 |
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 770-773, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Sharon Bewick, Mingjun Zhang, William R. Hamel, Ruoting Yang |
Passive vs. aggressive strategies: A game theoretic analysis of military defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 1873-1878, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Wei Jiang, Zhihong Tian, Hongli Zhang 0001, Xin-fang Song |
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 648-653, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Gregory Levitin |
Optimal Defense Strategy Against Intentional Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 56(1), pp. 148-157, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Raman Sharykin, Phillip A. Porras |
Applying Formal Evaluation to Worm Defense Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 479-486, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 |
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 576-587, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin |
Apply Data Mining to Defense-in-Depth Network Security System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 159-162, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan |
A Defense-Centric Taxonomy Based on Attack Manifestations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 102-, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Wojciech Jamroga |
A Defense Model for Games with Incomplete Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KI/ÖGAI ![In: KI 2001: Advances in Artificial Intelligence, Joint German/Austrian Conference on AI, Vienna, Austria, September 19-21, 2001, Proceedings, pp. 260-274, 2001, Springer, 3-540-42612-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Tuncer I. Ören, Susan K. Numrich, Adelinde M. Uhrmacher, Linda F. Wilson, Erol Gelenbe |
Agent-directed simulation: challenges to meet defense and civilian requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 32nd conference on Winter simulation, WSC 2000, Wyndham Palace Resort & Spa, Orlando, FL, USA, December 10-13, 2000, pp. 1757-1762, 2000, WSC, 0-7803-6582-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou |
How Many Attackers Can Selfish Defenders Catch? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 470, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 259-262, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Mihui Kim, Jaewon Seo, Kijoon Chae |
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEUS ![In: Software Technologies for Embedded and Ubiquitous Systems, 5th IFIP WG 10.2 International Workshop, SEUS 2007, Santorini Island, Greece, May 2007. Revised Papers, pp. 466-476, 2007, Springer, 978-3-540-75663-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga |
A Framework for Conceptualizing Social Engineering Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 79-90, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
system archetype, pattern recognition, information security, system dynamics, critical infrastructure, Social engineering |
35 | Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé |
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30 - April 2, 2003, pp. 7-14, 2003, IEEE Computer Society, 0-7695-1911-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher |
DefCOM: Defensive Cooperative Overlay Mesh. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 101-102, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | B. A. Batchelder |
ADAM (Attrition Damage Assessment Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 4(2), pp. 114, 1961. The full citation details ...](Pics/full.jpeg) |
1961 |
DBLP DOI BibTeX RDF |
weapons effectiveness, programming, Monte Carlo method, computer simulation, computer application |
34 | William W. Agresti |
The Four Forces Shaping Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(2), pp. 101-104, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Reconnaissance fingerprinting, Network defense, Security Cybersecurity, Cyberterrorists, Rebranding, National defense, Information technology |
34 | Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena |
BitBlaze: A New Approach to Computer Security via Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 1-25, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis |
34 | Jeffrey A. Mattson |
Cyber Defense Exercise: A Service Provider Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Conference on Information Security Education ![In: Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA, pp. 81-86, 2007, Springer, 978-0-387-73268-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cyber Defense Exercise, Training Information Assurance Professionals, Information Security Education |
34 | Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu |
Port and Address Hopping for Active Cyber-Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 295-300, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping |
34 | Duminda Wijesekera, James Bret Michael, Anil Nerode |
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 115-118, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ballistic Missile Defense Policy, Agents |
34 | Michael V. Capps, Perry McDowell, Michael Zyda |
A Future for Entertainment-Defense Research Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 21(1), pp. 37-43, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Defense and entertainment collaboration, virtual environments and simulation, modeling, networks, interactive entertainment |
33 | Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman |
Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 29-53, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | George Cybenko, Michael P. Wellman, Peng Liu 0005, Minghui Zhu |
Overview of Control and Game Theory in Adaptive Cyber Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 1-11, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen |
Adaptive Cyber Defenses for Botnet Detection and Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 156-205, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam |
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 206-231, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis |
Control-Theoretic Approaches to Cyber-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 12-28, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu 0005 |
MTD Techniques for Memory Protection Against Zero-Day Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 129-155, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin |
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 727-752, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Eduardo Vellasques, Robert Sabourin, Eric Granger |
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 367-389, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Diana Inkpen |
Text Mining in Social Media for Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 491-517, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Catherine Cheung, Julio J. Valdés, Jobin Puthuparampil |
Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 605-634, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Francesco Flammini, Stefano Marrone 0001, Nicola Mazzocca, Valeria Vittorini |
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 71-100, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Marco Cococcioni |
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 445-465, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Julio J. Valdés, Fawaz A. Alsulaiman, Abdulmotaleb El-Saddik |
Visualization of Handwritten Signatures Based on Haptic Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 277-307, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Gonzalo Nápoles, Isel Grau, Rafael Falcon, Rafael Bello 0001, Koen Vanhoof |
A Granular Intrusion Detection System Using Rough Cognitive Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 169-191, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Paloma de las Cuevas, Zeineb Chelly, Antonio Miguel Mora, Juan Julián Merelo Guervós, Anna Isabel Esparcia-Alcázar |
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 139-167, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti |
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 519-552, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Boris Kovalerchuk, Leonid I. Perlovsky |
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 695-726, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Shawn Eastwood, Svetlana N. Yanushkevich |
Risk Assessment in Authentication Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 391-420, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Bindu Madhavi Padmanabhuni, Kartick Subramanian, Suresh Sundaram 0002 |
Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 309-338, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu |
Classification-Driven Video Analytics for Critical Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 45-69, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | D. Vijay Rao |
Design and Development of Intelligent Military Training Systems and Wargames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 555-603, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Fátima Barceló-Rico, Anna Isabel Esparcia-Alcázar, Antonio Villalón-Huerta |
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 225-248, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Mark G. Ball, Blerim Qela, Slawomir Wesolkowski |
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 663-693, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | David Bissessar, Carlisle Adams, Alex Stoianov |
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 339-366, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Stuart H. Rubin, Thouraya Bouabana-Tebibel |
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 193-223, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Timothy C. Havens, Derek T. Anderson, Kevin E. Stone, John Becker, Anthony J. Pinar |
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 13-44, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Francesca De Simio, Marco Tesei, Roberto Setola |
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 423-444, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Jillian Morgan, Nur Zincir-Heywood, John T. Jacobs |
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 249-273, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Kun Wang 0009, Eleni Petraki, Hussein A. Abbass |
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 635-661, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Sansanee Auephanwiriyakul, Yutthana Munklang, Nipon Theera-Umpon |
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 467-489, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Ivan Jordanov, Nedyalko Petrov |
Intelligent Radar Signal Recognition and Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Computational Intelligence in Defense and Security ![In: Recent Advances in Computational Intelligence in Defense and Security, pp. 101-135, 2016, Springer, 978-3-319-26448-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Gabriel Jakobson |
Mission Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Defense and Situational Awareness ![In: Cyber Defense and Situational Awareness, pp. 297-322, 2014, Springer, 978-3-319-11390-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 7090 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|