default search action
CISDA 2009: Ottawa, Canada
- 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Ottawa, Canada, July 8-10, 2009. IEEE 2009, ISBN 978-1-4244-3764-1
Special Session - Complex Adaptive Systems 1
- Irene Pestov, Simona Verga:
Dynamical networks as a tool for system analysis and exploration. 1-8 - Jana Diesner, Kathleen M. Carley:
He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis. 1-8 - Trevor Martin, Yun Shen:
mTRACK - Monitoring time-varying relations in approximately categorised knowledge. 1-8 - Anthony Stirtzinger, Craig S. Anken, Bruce McQueary:
Goal-driven semi-automated generation of semantic models. 1-7 - Terrill L. Frantz, Kathleen M. Carley:
Information assurances and threat identification in networked organizations. 1-5
Special Session - Adaptive Network Security and Management 1
- Safaa Zaman, Fakhri Karray:
Collaborative architecture for distributed intrusion detection system. 1-7 - Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis:
Detection of slow malicious worms using multi-sensor data fusion. 1-9 - Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani:
A detailed analysis of the KDD CUP 99 data set. 1-6 - Anna T. Lawniczak, Bruno N. Di Stefano, Hao Wu:
Detection & study of DDoS attacks via entropy in data network models. 1-8 - Carson Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji:
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT. 1-7
Special Session - Complex Adaptive Systems 2
- Ruibiao J. Guo, Brad Cain:
Integrating reasoning with personality effects in simulated operators. 1-8 - Zeeshan-ul-hassan Usmani, Fawzi A. Alghamdi, Daniel Kirk:
BlastSim - Multi agent simulation of suicide bombing. 1-8 - Il-Chul Moon:
Simulation analysis on destabilization of complex adaptive organizations. 1-8 - Dragos Calitoiu:
New search algorithm for randomly located objects: A non-cooperative agent based approach. 1-6
Special Session - Computational Intelligence for Unmanned Aerial Vehicles 1
- Robert J. Mullen, Dorothy Ndedi Monekosso, Sarah A. Barman, Paolo Remagnino:
Autonomous control laws for mobile robotic surveillance swarms. 1-6 - Gilles Labonté:
Canadian artic Sovereignty: Local intervention by flocking UAVs. 1-8 - P. B. Sujit, João Borges de Sousa, Fernando M. Lobo Pereira:
Multiple UAV teams for multiple tasks. 1-8
Sensor Networks, Tracking and Radar
- David Akselrod, Ratnasingham Tharmarasa, Thia Kirubarajan, Zhen Ding, Tony Ponsford:
Multisensor-multitarget tracking testbed. 1-6 - Ratnasingham Tharmarasa, Thia Kirubarajan, Michael McDonald:
Passive multitarget tracking using transmitters of opportunity. 1-8 - Ratnasingham Tharmarasa, Thia Kirubarajan, Thomas Lang:
Joint path planning and sensor subset selection for multistatic sensor networks. 1-8 - Derek Elsaesser:
Emitter geolocation using low-accuracy direction-finding sensors. 1-7 - Zhen Ding, Henry Leung:
Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network. 1-5
Special Session - Computational Intelligence in Unmanned Aerial Vehicles 2
- Suresh Suresh:
Adaptive neural flight control system for helicopter. 1-8 - Hai-Jun Rong, Narasimhan Sundararajan:
Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failures. 1-8 - Peter Sarunic, Robin J. Evans, William Moran:
Control of unmanned aerial vehicles for passive detection and tracking of multiple emitters. 1-7 - Suresh Sundaram, Hai-Jun Rong, Narasimhan Sundararajan:
Bio-inspired computing for launch vehicle design and trajectory optimization. 1-8
Special Session - Military Logistics
- Michael Mazurek, Slawomir Wesolkowski:
Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm. 1-7 - Ahmed Ghanmi, Alain Martel, Jean Berger, Abdeslem Boukhtouta:
A framework for the design of a military operational supply network. 1-9 - Bohdan Kaluzny, R. H. A. David Shaw, Ahmed Ghanmi, Beomjoon Kim:
An optimisation model for airlift load planning: Galahad and the quest for the 'holy grail'. 1-8 - Tom Flanagan, Chris Thornton, Jörg Denzinger:
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior. 1-8
Localization, Tracking and Biometrics
- Jason P. Rhinelander, Peter X. Liu:
Tracking a moving hypothesis for visual data with explicit switch detection. 1-8 - Andres Solis Montero, Amiya Nayak, Milos Stojmenovic, Nejib Zaguia:
Robust line extraction based on repeated segment directions on image contours. 1-7 - Dmitri Ignakov, Galina Okouneva, Guangjun Liu:
Localization of door handle using a single camera on a door opening mobile manipulator. 1-7 - Rimon Elias, Amal Elnahas:
Fast localization in indoor environments. 1-6 - Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti:
Neural-based iterative approach for iris detection in iris recognition systems. 1-6
Special Session - Adaptive Network Security and Management 2
- Antonio Trifilo, Stefan Burschka, Ernst W. Biersack:
Traffic to protocol reverse engineering. 1-8 - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka:
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing. 1-8 - Wael Khreich, Eric Granger, Ali Miri, Robert Sabourin:
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection. 1-8 - Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood:
Evolving TCP/IP packets: A case study of port scans. 1-8 - Riyad Alshammari, Nur Zincir-Heywood:
Machine learning based encrypted traffic classification: Identifying SSH and Skype. 1-8 - Saeed Samet, Ali Miri:
Secure two and multi-party association rule mining. 1-6
Special Session - Applied Computational Intelligence in Biometrics
- Jean-François Connolly, Eric Granger, Robert Sabourin:
Incremental adaptation of fuzzy ARTMAP neural networks for video-based face classification. 1-8 - Amioy Kumar, Madasu Hanmandlu, H. M. Gupta:
Online biometric authentication using hand vein patterns. 1-7 - Dmitry O. Gorodnichy:
Evolution and evaluation of biometric systems. 1-8 - Ehsan Fazl Ersi, John K. Tsotsos:
Local feature analysis for robust face recognition. 1-6 - Fawaz A. Alsulaiman, Nizar Sakr, Julio J. Valdés, Abdulmotaleb El-Saddik, Nicolas D. Georganas:
Feature selection and classification in genetic programming: Application to haptic-based biometric data. 1-7 - Krzysztof Slot, Jaroslaw Cichosz, Lukasz Bronakowski:
Application of voiced-speech variability descriptors to emotion recognition. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.