Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards an Invisible Honeypot Monitoring System. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Dean A. Jones, Chad E. Davis, Mark A. Turnquist, Linda K. Nozick |
Physical Security and Vulnerability Modeling for Infrastructure Facilities. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Omar U. Flórez-Choque, Ernesto Cuadros-Vargas |
A Biologically Motivated Computational Architecture Inspired in the Human Immunological System to Quantify Abnormal Behaviors to Detect Presence of Intruders. |
BICC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Abdul Sahid Khan, Madhavan Mukund, S. P. Suresh |
Generic Verification of Security Protocols. |
SPIN |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo Corin, Ari Saptawijaya, Sandro Etalle |
PS-LTL for Constraint-Based Security Protocol Analysis. |
ICLP |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Tomasz Truderung |
Regular Protocols and Attacks with Regular Knowledge. |
CADE |
2005 |
DBLP DOI BibTeX RDF |
|
20 | J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti |
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Frédéric Raynal, Yann Berthier, Philippe Biondi, Danielle Kaminsky |
Honeypot Forensics, Part II: Analyzing the Compromised Host. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
network analysis, honeypots, honeynets |
20 | Xuehou Tan |
An Optimal Algorithm for the 1-Searchability of Polygonal Rooms. |
JCDCG |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Stéphanie Delaune, Florent Jacquemard |
A Theory of Dictionary Attacks and its Complexity. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
20 | Mohamed Mejri |
Chaotic Protocols. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Jan Cederquist, Muhammad Torabi Dashti |
Formal Analysis of a Fair Payment Protocol. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
20 | Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis |
Attack Propagation in Networks. |
Theory Comput. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Cas Cremers, Sjouke Mauw |
Operational Semantics of Security Protocols. |
Scenarios: Models, Transformations and Tools |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Mauro Borchardt, Carlos Maziero, Edgard Jamhour |
An Architecture for On-the-Fly File Integrity Checking. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano |
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. |
TACAS |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Whe Dar Lin |
Toward a Security EC Transaction on Web. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun |
Design of Active HoneyPot System. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Niv Buchbinder, Erez Petrank |
Lower and Upper Bounds on Obtaining History Independence. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer |
Intrusion Detection: A Bioinformatics Approach. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection |
20 | Salem Benferhat, Fabien Autrel, Frédéric Cuppens |
Enhanced Correlation in an Intrusion Detection Process. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Iliano Cervesato |
Data Access Specification and the Most Powerful Symbolic Attacker in MSR. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Jeffrey Van Baalen, Thomas Böhne |
Automated Protocol Analysis in Maude. |
FAABS |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
20 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Sang-Min Park, Jae-Ha Lee, Kyung-Yong Chwa |
Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher. |
ICALP |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Xuehou Tan |
Searching a Simple Polygon by a k-Searcher. |
ISAAC |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron |
Compiling and Verifying Security Protocols. |
LPAR |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Kunikazu Yoda, Hiroaki Etoh |
Finding a Connection Chain for Tracing Intruders. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Barbará, Rajni Goel, Sushil Jajodia |
Using Checksums to Detect Data Corruption. |
EDBT |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Dieter Gollmann |
Insider Fraud (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Gavin Lowe, A. W. Roscoe 0001 |
Using CSP to Detect Errors in the TMN Protocol. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
protocol failure, model checking, cryptography, Security protocols, CSP, key establishment, FDR |
20 | Michael K. Reiter, Kenneth P. Birman |
How to Securely Replicate Services. |
ACM Trans. Program. Lang. Syst. |
1994 |
DBLP DOI BibTeX RDF |
replication, causality, state machines, threshold cryptography |
19 | Priti Mandal, Lakshi Prosad Roy, Santos Kumar Das |
Accurate Localization of Intruder Drone by UAV Mounted Adaptable Radar Antenna in Restricted Areas. |
IEEE Trans. Aerosp. Electron. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Muhammed Fatih Çorapsiz |
Lifetime maximization of wireless sensor networks while ensuring intruder detection. |
Soft Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Illia Zaiets, Vitalii Brydinskyi, Dmytro Sabodashko, Yuriy Khoma, Khrystyna Ruda |
Integrated System for Speaker Diarization and Intruder Detection using Speaker Embeddings. |
CPITS |
2024 |
DBLP BibTeX RDF |
|
19 | Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos |
Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception. |
J. Cybersecur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Erdi Kara, George Zhang, Joseph J. Williams, Gonzalo Ferrandez-Quinto, Leviticus J. Rhoden, Maximilian Kim, J. Nathan Kutz, Aminur Rahman |
Deep learning based object tracking in walking droplet and granular intruder experiments. |
J. Real Time Image Process. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 |
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Erdi Kara, George Zhang, Joseph J. Williams, Gonzalo Ferrandez-Quinto, Leviticus J. Rhoden, Maximilian Kim, J. Nathan Kutz, Aminur Rahman |
Deep Learning Based Object Tracking in Walking Droplet and Granular Intruder Experiments. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Elysia Q. Smyers, Sydney M. Katz, Anthony L. Corso, Mykel J. Kochenderfer |
AVOIDDS: Aircraft Vision-based Intruder Detection Dataset and Simulator. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, Khadija M. Alaidarous, Ibrahim M. Alwayle, Heba Mohsen, Ibrahim Abdulrab Ahmed, Mesfer Al Duhayyim |
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment. |
Comput. Syst. Sci. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Doron Nussbaum, Fedor Ilitchev |
Chasing an intruder with limited information. |
Int. J. Intell. Robotics Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Peter Padiet, Md. Rafiqul Islam, M. Arif Khan |
Analysis of Malicious Intruder Threats to Data Integrity. |
ACR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jun Yong Eom, Seok Un Jang, Wha Sook Jeon |
Wi-Sniffer: Wifi-based intruder detection system using deep learning and decision tree. |
VTC2023-Spring |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Suryansh Sharma, Prabhakar Venkata Tamma, Shalakha Singhal, Gogineni Gopi Sunanth Kumar, R. Venkatesha Prasad |
B4W: A Smart Wireless Intruder Detection System. |
ICC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Amirmohammad Pasdar, Young Choon Lee, Seok-Hee Hong 0001 |
Catch the Intruder: Collaborative and Personalized Malware Detection By On-Device Application Fingerprinting. |
ICWS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha |
Chasing the Intruder: A Reinforcement Learning Approach for Tracking Unidentified Drones. |
AIR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Uihwan Choi, Soojeon Lee |
Optimization of collision-free trajectories for advanced air mobility under risk of a non-cooperative intruder. |
ICTC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Elysia Q. Smyers, Sydney M. Katz, Anthony Corso 0001, Mykel J. Kochenderfer |
AVOIDDS: Aircraft Vision-based Intruder Detection Dataset and Simulator. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
19 | Muhammad Syafiq Mohd Zainordin, Sharifah Saon, Abd Kadir Mahamad, Nurhanna Umairah Khuzairi, Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi |
Intruder Motion Detection with Notification System. |
GCCE |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Anton Bernshteyn, Eugene Lee |
Searching for an Intruder on Graphs and Their Subdivisions. |
Electron. J. Comb. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sufal Chandra Swar, Suresh Manickam, David W. Casbeer, Krishna Kalyanam, Swaroop Darbha |
Optimal Autonomous Pursuit of an Intruder on a Grid Aided by Local Node and Edge Sensors. |
Unmanned Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Antonella Barisic, Frano Petric, Stjepan Bogdan |
Brain over Brawn: Using a Stereo Camera to Detect, Track, and Intercept a Faster UAV by Reconstructing the Intruder's Trajectory. |
Field Robotics |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Badr Lahasan, Hussein Samma |
Optimized Deep Autoencoder Model for Internet of Things Intruder Detection. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Pubali De, Amitava Chatterjee, Anjan Rakshit |
PIR-Sensor-Based Surveillance Tool for Intruder Detection in Secured Environment: A Label-Consistency-Based Modified Sequential Dictionary Learning Approach. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Izlian Yolanda Orea-Flores, Mario E. Rivero-Angeles, Ana L. Onofre-Soto, Edna G. Azpeitia-Rebollar, Noé Torres-Cruz, Iclia Villordo-Jimenez, Angel Pretelín-Ricárdez, Rolando Menchaca-Méndez |
Teletraffic analysis of energy-efficient intruder detection using hash function techniques in images for remote monitoring in Wireless Sensor Networks. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Justin M. Kennedy, Jason J. Ford, Daniel E. Quevedo |
Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Adam B. Haywood, Brian J. Lunday, Matthew J. Robbins, Meir Pachter |
The weighted intruder path covering problem. |
Eur. J. Oper. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Hai Zhang, Gengzhe Fu, Yongzhang Su, Yixin Yue, Wei Zhu, Chenyu Zhang, Yuxiang Lu |
Safety Study of High-Speed Collisions between Trains and Live Intruder. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Raunak Srivastava, Rolif Lima, Kaushik Das |
Aerial Interception of Non-Cooperative Intruder using Model Predictive Control. |
ACC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Young-Il Kim, Park Seong Hee, Tae-Wook Heo, Tae-Chong Lee, Yong-Hyun Yeun, Seung-Tae Kim |
Performance Analysis of Geo-Fencing Effect for Intruder Monitoring. |
CSCI |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Paniti Netinant, Auttapon Amatyakul, Meennapa Rukhiran |
Alert Intruder Detection System Using Passive Infrared Motion Detector based on Internet of Things. |
ICSIM |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mohtasin Golam, Rubina Akter, Revin Naufal Alief, Van-Sang Doan, Jae-Min Lee, Dong-Seong Kim 0002 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things. |
MILCOM |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Justin M. Kennedy, Jason J. Ford, Daniel E. Quevedo |
Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation. |
ANZCC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mrunalini Nalamati, Muhammad Saqib, Nabin Sharma, Michael Blumenstein |
Exploring Transformers for Intruder Detection in Complex Maritime Environment. |
AI |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Milda Zaliauskaite |
Role of ruler or intruder? Patient's right to autonomy in the age of innovation and technologies. |
AI Soc. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Prasanta Kumar Jena, Subhojit Ghosh, Ebha Koley |
Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility. |
Int. J. Crit. Infrastructure Prot. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry |
CONSOLE: intruder detection using a UAV swarm and security rings. |
Swarm Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Edmond Nurellari, Daniel Bonilla Licea, Mounir Ghogho, Mario Eduardo Rivero-Angeles |
On Trajectory Design for Intruder Detection in Wireless Mobile Sensor Networks. |
IEEE Trans. Signal Inf. Process. over Networks |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Wasana Boonsong, Oluseye Adeleke, Widad Ismail |
Accuracy Performance Analysis of Safety Sensors Based NETPIE-Intruder Detection System on Internet of Things Platform. |
Wirel. Pers. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Elijah S. Lee, Daigo Shishika, Giuseppe Loianno, Vijay Kumar 0001 |
Defending a Perimeter from a Ground Intruder Using an Aerial Defender: Theory and Practice. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 |
Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Maximilian Mozes, Bennett Kleinberg |
No Intruder, no Validity: Evaluation Criteria for Privacy-Preserving Text Anonymization. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Gauri Kalnoor, S. Gowrishankar |
Internet of Things (IoT) based Network Integrated with Sensor Nodes for Intruder Detection and Low Energy Consumption. |
J. Ubiquitous Syst. Pervasive Networks |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Pawel Rzucidlo, Grzegorz Jaromi, Tomasz Kapuscinski, Damian Kordos, Tomasz Rogalski, Piotr Szczerba |
In-Flight Tests of Intruder Detection Vision System. |
Sensors |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Elijah S. Lee, Daigo Shishika, Giuseppe Loianno, Vijay Kumar 0001 |
Defending a Perimeter from a Ground Intruder Using an Aerial Defender: Theory and Practice. |
SSRR |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Sheeba Armoogum, Nawaz Mohamudally 0001 |
A Novel Prevention Technique Using Deep Analysis Intruder Tracing with a Bottom-Up Approach Against Flood Attacks in VoIP Systems. |
ICO |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Pavel Záviska, Petr Dejdar, Petr Münster |
Comparison of image edge detection methods for intruder detection in a phase-sensitive OTDR system. |
ICUMT |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Vipa Thananant, Chumpol Mokarat |
An IoT Based Intruder and Smoke Monitoring System. |
ICCAI |
2021 |
DBLP DOI BibTeX RDF |
|
19 | R. C. P. D. Peiris, R. Tharmikka, H. M. V. R. Herath, Maheshi B. Dissanayake, M. A. U. S. Navaratne |
Intruder Detection System Through Walking Pattern Analysis for Home Security. |
ICIIS |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jiahong Xu, Xiaofeng Liu 0006, Xu Zhou, Huan Wang 0012, Qiguang Lin |
Planning strategy for intruder agent based on game theory and artificial potential field. |
RCAR |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Anik Alvi, Tarem Ahmed, Mohammad Faisal Uddin |
Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection. |
AINA (1) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cristino De Souza Junior |
Hunter drones : drones cooperation for tracking an intruder drone. (Drones en coopération pour la poursuite d'un drone intrus). |
|
2021 |
RDF |
|
19 | Elijah S. Lee, Daigo Shishika, Vijay Kumar 0001 |
Perimeter-defense Game between Aerial Defender and Ground Intruder. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Alireza Partovi, Taeho Jung, Hai Lin 0002 |
Opacity of Discrete Event Systems with Active Intruder. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Mashnoon Islam, Touhid Ahmed, Abu Tammam Bin Nuruddin, Mashuda Islam, Shahnewaz Siddique |
Autonomous Intruder Detection Using a ROS-Based Multi-Robot System Equipped with 2D-LiDAR Sensors. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Pramuditha Perera, Julian Fiérrez, Vishal M. Patel 0001 |
Quickest Intruder Detection for Multiple User Active Authentication. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Animesh Chakravarthy, Debasish Ghose |
Cooperative Pursuit Guidance to Surround Intruder Swarms Using Collision Cones. |
J. Aerosp. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Lamia Hamza |
Intruder model for generating attack scenarios in computer systems. |
Int. J. Inf. Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mashnoon Islam, Touhid Ahmed, Abu Tammam Bin Nuruddin, Mashuda Islam, Shahnewaz Siddique |
Autonomous Intruder Detection Using a ROS-Based Multi-Robot System Equipped with 2D-LiDAR Sensors. |
SSRR |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Pramuditha Perera, Julian Fiérrez, Vishal M. Patel 0001 |
Quickest Intruder Detection For Multiple User Active Authentication. |
ICIP |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry |
Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection. |
OLA |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Rajnish Bhusal, Baris Taner, Kamesh Subbarao |
On the Phase Margin of Networked Dynamical Systems and Fabricated Attacks of an Intruder. |
ACC |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Elijah S. Lee, Daigo Shishika, Vijay Kumar 0001 |
Perimeter-defense Game between Aerial Defender and Ground Intruder. |
CDC |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Miguel Angel Quiroz Martinez, Deivid Temistocles Leon Rugel, Carlos Jose Espinoza Alcivar, Maikel Yelandi Leyva Vazquez |
A Framework for Selecting Classification Models in the Intruder Detection System Using TOPSIS. |
IHIET (Paris) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Daniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry |
Competitive Evolution of a UAV Swarm for Improving Intruder Detection Rates. |
IPDPS Workshops |
2020 |
DBLP DOI BibTeX RDF |
|