A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Abbass, Hussein
A Temporal Risk Assessment Framework for Planning A Future Force Structure
AbuSharekh, Ashraf
Computationally Derived Models of Adversary Organizations
Angelov, Plamen
Antkiewicz, Ryszard
Azvine, Ben
Computational Intelligence Support for Smart Queries and Adaptive Data
Baoshu, Wang
A Template-based Method for Force Group Classification in Situation Assessment
Barlow, Michael
A Temporal Risk Assessment Framework for Planning A Future Force Structure
Benjamin, David
A Cognitive Approach to Intrusion Detection
Blowers, Misty
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications
Burgin, George
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation
Burns, Daniel
DePass, Beth
Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning
Doris, Kenneth
Improved Missile Route Planning and Targeting Using Game-Based Computational Intelligence
Dunham, Cory
Towards Automating Airspace management
Eitelman, Susan
Towards Automating Airspace management
Elovici, Yuval
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Faez, Karim
A Face Detection Framework Based on Selected Face Components
Face Recognition System Using Ant Colony Optimization-Based Selected Features
Fitzgerald, Dennis
Fogel, David
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation
Fortson, Larry
Towards an Information Asset-Based Defensive Cyber Damage Assesssment Process
Geiger, Brian
An Intelligent Controller for Collaborative Unmanned Air Vehicles
Glezer, Chanan
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Graham, Scott
Grimaila, Michael
Towards an Information Asset-Based Defensive Cyber Damage Assesssment Process
Gus, Ido
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Hanford, Scott
A Review of Intelligent Systems Software for Autonomous Vehicles
Harger, Echo
Towards Automating Airspace management
Heywood, Malcolm
Automatically Evading IDS Using GP Authored Attacks
Hopkinson, Kenneth
Hosseinzadeh, Mehdi
Face Recognition System Using Ant Colony Optimization-Based Selected Features
Huimin, Chai
A Template-based Method for Force Group Classification in Situation Assessment
Janrathitikarn, Oranuj
A Review of Intelligent Systems Software for Autonomous Vehicles
Kansal, Smriti
Computationally Derived Models of Adversary Organizations
Kayacik, Gunes
Automatically Evading IDS Using GP Authored Attacks
Kleeman, Mark
Kreutz-Delgado, Ken
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation
Kulas, Wojciech
Lamont, Gary
LaRoche, Patrick
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks
Levis, Alexander
Computational Verification of System Architectures
Computationally Derived Models of Adversary Organizations
Course of Action Analysis in a Cultural Landscape Using Influence Nets
Li, Yongping
Linderman, Richard
Long, Lyle
An Intelligent Controller for Collaborative Unmanned Air Vehicles
A Review of Intelligent Systems Software for Autonomous Vehicles
Makanju, Adetokunbo
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks
Martin, Trevor
Computational Intelligence Support for Smart Queries and Adaptive Data
Meng, Yan
The PSO-Based Adaptive Window for People Tracking
Miller, Jodi
An Intelligent Controller for Collaborative Unmanned Air Vehicles
A Review of Intelligent Systems Software for Autonomous Vehicles
Moore, Michael
Moskovitch, Robert
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Najgebauer, Andrzej
Niessner, Albert
An Intelligent Controller for Collaborative Unmanned Air Vehicles
Nosrati, S. Masoud
A Face Detection Framework Based on Selected Face Components
Oh, Jae
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications
Pakazad, Saeed
A Face Detection Framework Based on Selected Face Components
Park, WonKyung
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications
Pierzchala, Dariusz
Pluderman, Shay
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Qiu, Qinru
Rashidy Kanan, Hamidreza
Face Recognition System Using Ant Colony Optimization-Based Selected Features
Rulka, Jaroslaw
Shahar, Yuval
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Shen, Yun
Computational Intelligence Support for Smart Queries and Adaptive Data
Silvia, David
Improved Missile Route Planning and Targeting Using Game-Based Computational Intelligence
Sinsley, Gregory
An Intelligent Controller for Collaborative Unmanned Air Vehicles
Sinsley, Greg
A Review of Intelligent Systems Software for Autonomous Vehicles
Srinoy, Surat
Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine
Stensrud, Brian
Towards Automating Airspace management
Stevens, Michael
Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors
Stopel, Dima
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
Taylor, Glenn
Towards Automating Airspace management
Vanesian, Tasha
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation
Wagenhals, Lee
Course of Action Analysis in a Cultural Landscape Using Influence Nets
Wang, Chengbo
Wang, Lin
White, Gregory
Anomaly Detection for Application Level Network Attacks Using Payload Keywords
Williams, Paul
Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors
Wolf, Matt
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications
Wong, Ted
ATR Applications in Military Missions
Wu, Qing
Yang, Ang
A Temporal Risk Assessment Framework for Planning A Future Force Structure
Zaidi, Abbas
Computational Verification of System Architectures
Zhang, Hongzhou
Zhang, Like
Anomaly Detection for Application Level Network Attacks Using Payload Keywords
Zheng, Yuhua
The PSO-Based Adaptive Window for People Tracking
Zhou, Xiaowei
Zincir-Heywood, Nur
Automatically Evading IDS Using GP Authored Attacks
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks