default search action
Recent Advances in Computational Intelligence in Defense and Security 2016
- Rami S. Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass:
Recent Advances in Computational Intelligence in Defense and Security. Studies in Computational Intelligence 621, Springer 2016, ISBN 978-3-319-26448-6 - Recent Advances in Computational Intelligence in Defense and Security. 1-9
Physical Security and Surveillance
- Timothy C. Havens, Derek T. Anderson, Kevin E. Stone, John Becker, Anthony J. Pinar:
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection. 13-44 - Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu:
Classification-Driven Video Analytics for Critical Infrastructure Protection. 45-69 - Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Valeria Vittorini:
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring. 71-100 - Ivan Jordanov, Nedyalko Petrov:
Intelligent Radar Signal Recognition and Classification. 101-135
Cyber Security and Intrusion Detection Systems
- Paloma de las Cuevas, Zeineb Chelly, Antonio Miguel Mora, Juan Julián Merelo Guervós, Anna Isabel Esparcia-Alcázar:
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique. 139-167 - Gonzalo Nápoles, Isel Grau, Rafael Falcon, Rafael Bello, Koen Vanhoof:
A Granular Intrusion Detection System Using Rough Cognitive Networks. 169-191 - Stuart H. Rubin, Thouraya Bouabana-Tebibel:
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies. 193-223 - Fátima Barceló-Rico, Anna Isabel Esparcia-Alcázar, Antonio Villalón-Huerta:
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats. 225-248 - Jillian Morgan, Nur Zincir-Heywood, John T. Jacobs:
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning. 249-273
Biometric Security and Authentication Systems
- Julio J. Valdés, Fawaz A. Alsulaiman, Abdulmotaleb El-Saddik:
Visualization of Handwritten Signatures Based on Haptic Information. 277-307 - Bindu Madhavi Padmanabhuni, Kartick Subramanian, Suresh Sundaram:
Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification. 309-338 - David Bissessar, Carlisle Adams, Alex Stoianov:
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. 339-366 - Eduardo Vellasques, Robert Sabourin, Eric Granger:
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems. 367-389 - Shawn Eastwood, Svetlana N. Yanushkevich:
Risk Assessment in Authentication Machines. 391-420
Situational Awareness and Threat Assessment
- Francesca De Simio, Marco Tesei, Roberto Setola:
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework. 423-444 - Marco Cococcioni:
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification. 445-465 - Sansanee Auephanwiriyakul, Yutthana Munklang, Nipon Theera-Umpon:
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features. 467-489 - Diana Inkpen:
Text Mining in Social Media for Security Threats. 491-517 - Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. 519-552
Strategic/Mission Planning and Resource Management
- D. Vijay Rao:
Design and Development of Intelligent Military Training Systems and Wargames. 555-603 - Catherine Cheung, Julio J. Valdés, Jobin Puthuparampil:
Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques. 605-634 - Kun Wang, Eleni Petraki, Hussein A. Abbass:
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning. 635-661 - Mark G. Ball, Blerim Qela, Slawomir Wesolkowski:
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. 663-693 - Boris Kovalerchuk, Leonid I. Perlovsky:
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models. 695-726 - Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin:
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. 727-752
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.