Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
WISDOM-II: A Network Centric Model for Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 813-819, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Yunxiang Ling, Xiangning Shi, Wenyuan Wang |
SimGrid-HLA - Simulation Grid prototype Oriented to Evaluation of Warfare Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SKG ![In: 2005 International Conference on Semantics, Knowledge and Grid (SKG 2005), 27-29 November 2005, Beijing, China, pp. 100, 2005, IEEE Computer Society, 0-7695-2534-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SimGrid, evaluation of warfare performance, prototype, federate, HLA/RTI |
78 | Yunxiang Ling, Miao Zhang, Xiaojun Lu, Wenyuan Wang, Songyang Lao |
Model Searching Algorithm Based on Response Order and Access Order in War-Game Simulation Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Edutainment ![In: Technologies for E-Learning and Digital Entertainment, First International Conference, Edutainment 2006, Hangzhou, China, April 16-19, 2006, Proceedings, pp. 627-637, 2006, Springer, 3-540-33423-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Maksim Tsvetovat, Maciej Latek |
Dynamics of Agent Organizations: Application to Modeling Irregular Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MABS ![In: Multi-Agent-Based Simulation IX, International Workshop, MABS 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers, pp. 60-70, 2008, Springer, 978-3-642-01990-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Terrorist Networks, Irregular Warfare, Social Network Analysis, Organizational Learning, Multiagent Simulation, Dynamic Social Networks |
65 | Mark Adkins, John Kruse, Robert Younger |
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 40, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
collaboration, ubiquitous computing, situation awareness, network centric warfare |
65 | Marion G. Cerut |
Mobile Agents in Network-Centric Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: Fifth International Symposium on Autonomous Decentralized Systems, ISADS 2001, Dallas, Texas, USA, March 26-28, 2001, pp. 243-246, 2001, IEEE Computer Society, 0-7695-1065-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
heterogeneous distributed information systems, Internet, communications, mobile agents, Command and control, intelligence, network-centric warfare |
65 | Carmine A. Vaccarino, George Konomos |
Real-Time Simulation For Verification Of Tactical Electronic Warfare System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference (1) ![In: Proceedings 1978 ACM Annual Conference, Washington, DC, USA, December 4-6, 1978, Volume I, pp. 334-341, 1978, ACM, 978-0-89791-000-2. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
Electronic warfare, Operational flight program, Verification, Real-time simulation |
61 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 97-105, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Allen Ott, Alex Moir, John T. Rickard |
A Game Theoretic Engine for Cyber Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 219-237, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Jared Holsopple, Shanchieh Jay Yang, Moises Sudit |
Mission Impact Assessment for Cyber Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 239-266, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Robert J. Elder, Alexander H. Levis, Bahram Yousefi |
Alternatives to Cyber Warfare: Deterrence and Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 15-35, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
52 | James Walden |
A real-time information warfare exercise on a virtual network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 86-90, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
capture the flag, network security, virtual machine, computer security, laboratory, exercise, user-mode linux, information warfare |
52 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 164-174, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
52 | Sung-Do Chi, Yong-Jun You, Chan-Ho Jung, Jang-Se Lee, Jae-Ick Kim |
FAMES: fully agent-based modeling & emergent simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
FAMES, SES/MB, battleship agent, modeling and simulation, agent-based |
44 | Henrik Bliddal |
CBRN Terrorism and the Challenge of Daesh. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 53-62, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Alessandro Niglia, Carlos Veraza |
Building Resilience Through Social Media After an Attack on Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 3-13, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 18-22, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 35-42, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Elina Lange Ionatamishvili, Sanda Svetoka |
Strategic Communications and Social Media in the Russia-Ukraine Conflict. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 86-93, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Anke Schmidt-Felzmann |
"Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 63-78, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Ben Hiller |
Cyber Security and CIP: A Potential Role for OSCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 14-17, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 43-52, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Liviu Lazar |
NATO Dialogue with the Defence and Security Industry in the Context of the Hybrid Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 137-143, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Gianni Cuozzo |
Critical Infrastructure Cyber-Attack Through Firmware Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 115-134, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Mikael Tofvesson |
Identifying and Countering Information Influence Activities Using a Comprehensive Society Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 79-85, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Daniel S. Hamilton |
Going Beyond Static Understandings: Resilience Must Be Shared, and It Must Be Projected Forward. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 23-32, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Mark Rhinard, Bengt Sundelius |
Stronger Together: Enhancing Cooperation Capacity for Forward Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 144-154, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Drazen Zgaljic, Paola Badurina-Tomic, Matej Plenca |
The Importance of Port Security System in the Implementation of Transport Modal-Shift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 106-114, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Robin Wikström, József Mezei |
Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 151-172, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Oleg Chertov, Dan Tavrov |
Microfiles as a Potential Source of Confidential Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 87-114, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu 0005 |
Cyber Insider Mission Detection for Situation Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 201-217, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Dan E. Tamir, Naphtali David Rishe, Mark Last, Abraham Kandel |
Soft Computing Based Epidemical Crisis Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 43-67, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Gulshan Kumar, Krishan Kumar 0001 |
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 173-200, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | James Llinas |
Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 129-149, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Fei-Yue Wang 0001, Xiaochen Li, Wenji Mao |
An ACP-Based Approach to Intelligence and Security Informatics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 69-86, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Charles LeDoux, Arun Lakhotia |
Malware and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 1-42, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Daniel Ortiz Arroyo |
Decision Support in Open Source Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 115-127, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Suchitra Abel |
Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Methods for Cyber Warfare ![In: Intelligent Methods for Cyber Warfare, pp. 267-278, 2015, Springer, 978-3-319-08623-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Napoleon C. Paxton, Stephen Russell 0001, Ira S. Moskowitz, Paul Hyden |
A Survey of Community Detection Algorithms Based On Analysis-Intent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 237-263, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Tudor Dumitras |
Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 265-285, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Patrick Sweeney, George Cybenko |
Identifying and Exploiting the Cyber High Ground for Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 37-56, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons |
Cyber Attribution: An Argumentation-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 151-171, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Sanjay Goel, Yuan Hong |
Cyber War Games: Strategic Jostling Among Traditional Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 1-13, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Noam Ben-Asher, Cleotilde Gonzalez |
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 207-220, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Christopher Kiekintveld, Viliam Lisý, Radek Píbil |
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 81-101, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | B. Aditya Prakash |
Graph Mining for Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 287-306, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Rami Puzis, Yuval Elovici |
Active Discovery of Hidden Profiles in Social Networks Using Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 221-235, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Samuel N. Hamilton |
Automated Adversary Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 141-149, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Kristin E. Heckman, Frank J. Stech |
Cyber Counterdeception: How to Detect Denial & Deception (D&D). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 103-140, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Julie L. Marble, William F. Lawless, Ranjeev Mittu, Joseph T. Coyne, Myriam Abramson, Ciara Sibley |
The Human Factor in Cybersecurity: Robust & Intelligent Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 173-206, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ehab Al-Shaer, Mohammad Ashiqur Rahman |
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 57-80, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Andrew Ruef, Chris Rohlf |
Programming Language Theoretic Security in the Real World: A Mirage or the Future? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Warfare ![In: Cyber Warfare - Building the Scientific Foundation, pp. 307-321, 2015, Springer, 978-3-319-14038-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
43 | Xiaohui Cui, Thomas E. Potok |
A Particle Swarm Social Model for Multi-Agent Based Insurgency Warfare Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 177-183, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
Evolving agents for network centric warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO Workshops ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Workshop Proceedings, Washington DC, USA, June 25-26, 2005, pp. 193-195, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network theory, multi-agent systems, complex adaptive systems |
43 | Xiaofei Wang, Yunqiu Chen |
Web-oriented Warfare Command Decision Support System Based on Agent and Data Warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 493-498, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | George F. Stone III, Gregory A. McIntyre |
JWARS: the joint warfare system (JWARS): a modeling and analysis tool for the defense department. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 691-696, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Yong-Woon Moon, Hae-Sun Jung, Chang-Sung Jeong |
Context-awareness in Battlefield using Ubiquitous Computing: Network Centric Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2873-2877, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Military Operation, Ubiquitous Computing, Middleware, Context-awareness, Network Centric Warfare |
39 | Saurabh Mukherjee, Shashikala Tapaswi |
Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 688-689, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Virtual warfare, Dedicated virtual reality system software, Virtual reality |
39 | Brajendra Panda, Joseph Giordano |
An overview of post information warfare data recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 1998 ACM symposium on Applied Computing, SAC'98, Atlanta, GA, USA, February 27 - March 1, 1998, pp. 253-254, 1998, ACM, 0-89791-969-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
recovery, data dependency, damage assessment, information warfare |
35 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 196-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
35 | J. S. Keane, Jerzy W. Rozenblit, Michael Barnes |
The Advanced Battlefield Architecture for Tactical Information Selection (ABATIS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 1997 Workshop on Engineering of Computer-Based Systems (ECBS '97), March 24-28, 1997, Monterey, CA, USA, pp. 228-237, 1997, IEEE Computer Society, 0-8186-7889-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Advanced Battlefield Architecture for Tactical Information Selection, warfare, display strategy testing, hierarchical design methodology, object-oriented design methodology, battlefield visualization, process centered display, display layer, object-oriented methods, class diagrams, object modeling technique |
35 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 224-235, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
35 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 265-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
34 | Zhigang Wang, Biao Liu, Xingang Cui, Yibo Li, Yongwen Yang, Zhichao Lyu |
The Application of Micro Coaxial Rotorcraft in Warfare: An Overview, Key Technologies, and Warfare Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 40358-40366, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Marthie Grobler, Ignus P. Swart |
On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: ICT and Society - 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings, pp. 239-254, 2014, Springer, 978-3-662-44207-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Murdoch Watney |
Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDF2C ![In: Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers, pp. 130-143, 2013, Springer, 978-3-319-14288-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung |
Cyber military strategy for cyberspace superiority in cyber warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 295-299, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Xiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, Georgi M. Dimirovski |
Effectiveness evaluation of warfare command systems with dissymmetrical warfare information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: American Control Conference, ACC 2010, Baltimore, Maryland, USA, June 30 - July 2, 2010, pp. 5556-5560, 2010, IEEE, 978-1-4244-7427-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Kedar Sambhoos, James Llinas |
Evaluation methods for distributed multi-platform systems in electronic warfare and information-warfare related missions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUSION ![In: 12th International Conference on Information Fusion, FUSION '09, Seattle, Washington, USA, July 6-9, 2009, pp. 163-170, 2009, IEEE, 978-0-9824438-0-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
34 | Samuel Liles |
Cyber warfare compared to fourth and fifth generation warfare as applied to the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISTAS ![In: IEEE International Symposium on Technology and Society, ISTAS 2007, Las Vegas, NV, USA, June 1-2, 2007, pp. 1-3, 2007, IEEE, 978-1-4244-0587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Tara Leweling, Ron Walters |
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIW ![In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005, pp. 195-204, 2005, Academic Conferences Limited, Reading, UK. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
34 | Ken Webb |
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIW ![In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005, pp. 391-400, 2005, Academic Conferences Limited, Reading, UK. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
34 | Geoffrey Darnton |
Content Analysis as a Tool of Information Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIW ![In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005, pp. 73-82, 2005, Academic Conferences Limited, Reading, UK. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
34 | Chester L. Smith |
Reply by Chester Smith [9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Technol. Soc. Mag. ![In: IEEE Technol. Soc. Mag. 23(2), pp. 27, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Avishag Gordon |
9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Technol. Soc. Mag. ![In: IEEE Technol. Soc. Mag. 23(2), pp. 5, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Samuel N. Hamilton, Wendy L. Hamilton |
Adversary Modeling and Simulation in Cyber Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 461-475, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Doo-Yeoun Cho, Myeong-Jo Son, Jung-Ho Kang, Sung-Jun Lee, Ju-Hwan Cha, Seong-Jin Yoo, Hyo-Kwang Lee, Kyu-Yeul Lee, Tae Wan Kim, Yong-Seog Ko |
Analysis of a submarine's evasive capability against an antisubmarine warfare torpedo using DEVS modeling and simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (2) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 2, pp. 307-315, 2007, SCS/ACM, 1-56555-313-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
evasive capability, simulation based acquisition (SBA), submarine, unified modeling language (UML), DEVS formalism |
30 | Darren Baker |
Advances in Communications Electronic Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 52-55, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Jun-feng Song, Weiming Zhang 0003, Weidong Xiao, Zhen-ning Xu |
Study on Construction and Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for Network Centric Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 368-373, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Gaoming Huang, Luxi Yang, Zhenya He |
Time-delay direction finding based on canonical correlation analysis [electronic warfare applications]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5409-5412, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | John Kruse, Mark Adkins, Kimberly A. Holloman |
Network Centric Warfare in the U.S. Navy's Fifth Fleet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Joshua Sinai |
Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 567-570, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Martin Fredriksson, Rune Gustavsson |
Quality of Service in Network-Centric Warfare and Challenges in Open Computational Systems Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria, pp. 359-364, 2003, IEEE Computer Society, 0-7695-1963-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Terence Robinson |
Simulation in support of military operations, tactics, and planning: ODIN: an underwater warfare simulation environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 672-679, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue |
Agent-based Simulation Approach to Information Warfare in the SEAS Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Pan Shi, Yifeng Lian |
Game-Theoretical Effectiveness Evaluation of DDoS Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 427-433, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
effectiveness evaluation, Game Theory, congestion control, DDoS |
26 | Daniel P. Jenkins, Neville A. Stanton, Paul M. Salmon, Guy H. Walker, Mark S. Young, Ian R. Whitworth, Andy Farmilo, Geoffrey Hone |
The Development of a Cognitive Work Analysis Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Engineering Psychology and Cognitive Ergonomics, 7th International Conference, EPCE 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 504-511, 2007, Springer, 978-3-540-73330-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Software Development, Training, Tools, Cognitive Work Analysis |
26 | Yang Hu, Chen Hang |
A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 682-687, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Xiong Li, Sheng Dang |
Tactical Battlefield Entities Simulation Model Based on Multi-agent Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 121-128, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-agent system, interactions, agent, modeling and simulation |
26 | David P. Biros, Kent Marett, Brent T. Langhals |
Vigilance and Error Detection in an Automated Command and Control Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Shen Zhihe, Liu Feng |
Applying Improved BP Neural Network In Underwater Targets Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 2588-2592, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Vishal Vatsa, Shamik Sural, Arun K. Majumdar |
A Game-Theoretic Approach to Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 263-276, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | O. Sami Saydjari |
Defending Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(12), pp. 125, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Martin Fredriksson, Rune Gustavsson |
Methodological principles in construction and observation of open computational systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 692-693, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
scalability and complexity issues, multiagent systems, methodologies and tools |
26 | Kenneth Y. Jo |
Satellite communications representation in network simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 33nd conference on Winter simulation, WSC 2001, Arlington, VA, USA, December 9-12, 2001, pp. 1346-1352, 2001, WSC, 0-7803-7309-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Brent Heeringa, Paul R. Cohen |
An underlying model for defeat mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 32nd conference on Winter simulation, WSC 2000, Wyndham Palace Resort & Spa, Orlando, FL, USA, December 10-13, 2000, pp. 933-939, 2000, WSC, 0-7803-6582-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Stephanie M. White, Michael Edwards |
Domain Engineering: The Challenge, Status, and Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), March 11-15, 1996, Friedrichshafen, Germany., pp. 96-101, 1996, IEEE Computer Society, 0-8186-7355-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
reuse, systems engineering, product lines, Domain engineering, business strategy, system families |
26 | Mark A. Woyna, John H. Christiansen, Christopher W. Hield, Kathy Lee Simunich |
Modeling Battlefield Sensor Environments with an Object Database Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993., pp. 499-501, 1993, ACM Press, 978-0-89791-592-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
C++, SQL |
22 | Zhanshan (Sam) Ma |
Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICI ![In: Artificial Intelligence and Computational Intelligence, International Conference, AICI 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 608-618, 2009, Springer, 978-3-642-05252-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis |
22 | Mariusz Chmielewski |
Ontology Applications for Achieving Situation Awareness in Military Decision Support Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 528-539, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Military operations, ontology, decision support, situation awareness, semantic models, Network Centric Warfare |