default search action
CISDA 2007: Honolulu, Hawaii, USA
- 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007, Honolulu, Hawaii, USA, April 1-5, 2007. IEEE 2007, ISBN 1-4244-0700-1
- Lin Wang, Yongping Li, Chengbo Wang, Hongzhou Zhang:
Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model. 1-6 - Matt B. Wolf, WonKyung Park, Jae C. Oh, Misty K. Blowers:
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications. 7-14 - Yuhua Zheng, Yan Meng:
The PSO-Based Adaptive Window for People Tracking. 23-29 - Ted Wong:
ATR Applications in Military Missions. 30-32 - Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham:
Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm. 33-41 - Abbas K. Zaidi, Alexander H. Levis:
Computational Verification of System Architectures. 42-49 - Beth DePass:
Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning. 50-56 - Hamidreza Rashidy Kanan, Karim Faez, Mehdi Hosseinzadeh Aghdam:
Face Recognition System Using Ant Colony Optimization-Based Selected Features. 57-62 - Kenneth Doris, David Silvia:
Improved Missile Route Planning and Targeting using Game-Based Computational Intelligence. 63-68 - Lyle N. Long, Scott D. Hanford, Oranuj Janrathitikarn, Greg L. Sinsley, Jodi A. Miller:
A Review of Intelligent Systems Software for Autonomous Vehicles. 69-76 - Trevor Martin, Ben Azvine, Yun Shen:
Computational Intelligence Support for Smart Queries and Adaptive Data. 77-84 - Huimin Chai, Baoshu Wang:
A Template-based Method for Force Group Classification in Situation Assessment. 85-91 - Smriti Kansal, Ashraf M. Abusharekh, Alexander H. Levis:
Computationally Derived Models of Adversary Organizations. 92-99 - Michael Barlow, Ang Yang, Hussein A. Abbass:
A Temporal Risk Assessment Framework for Planning A Future Force Structure. 100-107 - Tasha Vanesian, Kenneth Kreutz-Delgado:
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation. 108-115 - Lee W. Wagenhals, Alexander H. Levis:
Course of Action Analysis in a Cultural Landscape Using Influence Nets. 116-123 - Glenn Taylor, Brian Stensrud, Susan Eitelman, Cory Dunham, Echo A. Harger:
Toward Automating Airspace Management. 124-130 - Xiaowei Zhou, Plamen Angelov:
Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier. 131-138 - Gregory L. Sinsley, Jodi A. Miller, Lyle N. Long, Brian R. Geiger, Albert F. Niessner, Joseph F. Horn:
An Intelligent Controller for Collaborative Unmanned Air Vehicles. 139-144 - Andrzej Najgebauer, Ryszard Antkiewicz, Zbigniew Tarapata, Jaroslaw Rulka, Wojciech Kulas, Dariusz Pierzchala, Roman Wantoch-Rekowski:
The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System. 145-152 - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Automatically Evading IDS Using GP Authored Attacks. 153-160 - David P. Benjamin:
A Cognitive Approach to Intrusion Detection. 161-168 - Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer, Yuval Shahar, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. 169-177 - Like Zhang, Gregory B. White:
Anomaly Detection for Application Level Network Attacks Using Payload Keywords. 178-185 - Surat Srinoy:
Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine. 186-192 - Michael Stevens, Paul D. Williams:
Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors. 193-200 - Qing Wu, Qinru Qiu, Richard W. Linderman, Daniel J. Burns, Michael J. Moore, Dennis Fitzgerald:
Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform. 201-205 - Michael R. Grimaila, Larry Fortson:
Towards an Information Asset-Based Defensive Cyber Damage Assessment Process. 206-212 - Adetokunbo Makanju, Patrick LaRoche, Nur Zincir-Heywood:
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks. 213-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.