IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA 2007)

Author Index

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

A

Return to Top

Abbass, Hussein

A Temporal Risk Assessment Framework for Planning A Future Force Structure

AbuSharekh, Ashraf

Computationally Derived Models of Adversary Organizations

Angelov, Plamen

Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

Antkiewicz, Ryszard

The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System

Azvine, Ben

Computational Intelligence Support for Smart Queries and Adaptive Data

B

Return to Top

Baoshu, Wang

A Template-based Method for Force Group Classification in Situation Assessment

Barlow, Michael

A Temporal Risk Assessment Framework for Planning A Future Force Structure

Benjamin, David

A Cognitive Approach to Intrusion Detection

Blowers, Misty

Toward Open-Set Text-Independent Speaker Identification in Tactical Communications

Burgin, George

Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation

Burns, Daniel

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

D

Return to Top

DePass, Beth

Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning

Doris, Kenneth

Improved Missile Route Planning and Targeting Using Game-Based Computational Intelligence

Dunham, Cory

Towards Automating Airspace management

E

Return to Top

Eitelman, Susan

Towards Automating Airspace management

Elovici, Yuval

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

F

Return to Top

Faez, Karim

A Face Detection Framework Based on Selected Face Components

Face Recognition System Using Ant Colony Optimization-Based Selected Features

Fitzgerald, Dennis

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

Fogel, David

Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation

Fortson, Larry

Towards an Information Asset-Based Defensive Cyber Damage Assesssment Process

G

Return to Top

Geiger, Brian

An Intelligent Controller for Collaborative Unmanned Air Vehicles

Glezer, Chanan

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

Graham, Scott

Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm

Grimaila, Michael

Towards an Information Asset-Based Defensive Cyber Damage Assesssment Process

Gus, Ido

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

H

Return to Top

Hanford, Scott

A Review of Intelligent Systems Software for Autonomous Vehicles

Harger, Echo

Towards Automating Airspace management

Heywood, Malcolm

Automatically Evading IDS Using GP Authored Attacks

Hopkinson, Kenneth

Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm

Hosseinzadeh, Mehdi

Face Recognition System Using Ant Colony Optimization-Based Selected Features

Huimin, Chai

A Template-based Method for Force Group Classification in Situation Assessment

J

Return to Top

Janrathitikarn, Oranuj

A Review of Intelligent Systems Software for Autonomous Vehicles

K

Return to Top

Kansal, Smriti

Computationally Derived Models of Adversary Organizations

Kayacik, Gunes

Automatically Evading IDS Using GP Authored Attacks

Kleeman, Mark

Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm

Kreutz-Delgado, Ken

Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation

Kulas, Wojciech

The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System

L

Return to Top

Lamont, Gary

Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm

LaRoche, Patrick

A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks

Levis, Alexander

Computational Verification of System Architectures

Computationally Derived Models of Adversary Organizations

Course of Action Analysis in a Cultural Landscape Using Influence Nets

Li, Yongping

Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model

Linderman, Richard

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

Long, Lyle

An Intelligent Controller for Collaborative Unmanned Air Vehicles

A Review of Intelligent Systems Software for Autonomous Vehicles

M

Return to Top

Makanju, Adetokunbo

A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks

Martin, Trevor

Computational Intelligence Support for Smart Queries and Adaptive Data

Meng, Yan

The PSO-Based Adaptive Window for People Tracking

Miller, Jodi

An Intelligent Controller for Collaborative Unmanned Air Vehicles

A Review of Intelligent Systems Software for Autonomous Vehicles

Moore, Michael

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

Moskovitch, Robert

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

N

Return to Top

Najgebauer, Andrzej

The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System

Niessner, Albert

An Intelligent Controller for Collaborative Unmanned Air Vehicles

Nosrati, S. Masoud

A Face Detection Framework Based on Selected Face Components

O

Return to Top

Oh, Jae

Toward Open-Set Text-Independent Speaker Identification in Tactical Communications

P

Return to Top

Pakazad, Saeed

A Face Detection Framework Based on Selected Face Components

Park, WonKyung

Toward Open-Set Text-Independent Speaker Identification in Tactical Communications

Pierzchala, Dariusz

The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System

Pluderman, Shay

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

Q

Return to Top

Qiu, Qinru

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

R

Return to Top

Rashidy Kanan, Hamidreza

Face Recognition System Using Ant Colony Optimization-Based Selected Features

Rulka, Jaroslaw

The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System

S

Return to Top

Shahar, Yuval

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

Shen, Yun

Computational Intelligence Support for Smart Queries and Adaptive Data

Silvia, David

Improved Missile Route Planning and Targeting Using Game-Based Computational Intelligence

Sinsley, Gregory

An Intelligent Controller for Collaborative Unmanned Air Vehicles

Sinsley, Greg

A Review of Intelligent Systems Software for Autonomous Vehicles

Srinoy, Surat

Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine

Stensrud, Brian

Towards Automating Airspace management

Stevens, Michael

Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors

Stopel, Dima

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

T

Return to Top

Taylor, Glenn

Towards Automating Airspace management

V

Return to Top

Vanesian, Tasha

Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation

W

Return to Top

Wagenhals, Lee

Course of Action Analysis in a Cultural Landscape Using Influence Nets

Wang, Chengbo

Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model

Wang, Lin

Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model

White, Gregory

Anomaly Detection for Application Level Network Attacks Using Payload Keywords

Williams, Paul

Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors

Wolf, Matt

Toward Open-Set Text-Independent Speaker Identification in Tactical Communications

Wong, Ted

ATR Applications in Military Missions

Wu, Qing

Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing Platform

Y

Return to Top

Yang, Ang

A Temporal Risk Assessment Framework for Planning A Future Force Structure

Z

Return to Top

Zaidi, Abbas

Computational Verification of System Architectures

Zhang, Hongzhou

Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model

Zhang, Like

Anomaly Detection for Application Level Network Attacks Using Payload Keywords

Zheng, Yuhua

The PSO-Based Adaptive Window for People Tracking

Zhou, Xiaowei

Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

Zincir-Heywood, Nur

Automatically Evading IDS Using GP Authored Attacks

A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks