Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisda/cisda2015.bht:"
@inproceedings{DBLP:conf/cisda/AmannaAFR15, author = {Ashwin E. Amanna and Daniel Ali and David Gonzalez Fitch and Jeffrey H. Reed}, title = {Design of experiments based empirical models to support cognitive radio decision making}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208627}, doi = {10.1109/CISDA.2015.7208627}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AmannaAFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AndersonD15, author = {Gustave Anderson and David J. Dorsey}, title = {Ternary trust metric for mobile ad-hoc networks}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208633}, doi = {10.1109/CISDA.2015.7208633}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AndersonD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/AvvariSMZNPH15, author = {Gopi Vinod Avvari and David Sidoti and Manisha Mishra and Lingyi Zhang and Bala Kishore Nadella and Krishna R. Pattipati and James A. Hansen}, title = {Dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environment}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208622}, doi = {10.1109/CISDA.2015.7208622}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/AvvariSMZNPH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BalasingamPLR15, author = {Balakumar Balasingam and Krishna R. Pattipati and Georgiy M. Levchuk and John C. Romano}, title = {Robust collaborative learning by multi-agents}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208646}, doi = {10.1109/CISDA.2015.7208646}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/BalasingamPLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/BalkanliZ15, author = {Eray Balkanli and Nur Zincir{-}Heywood}, title = {Highlights on analyzing one-way traffic using different tools}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208635}, doi = {10.1109/CISDA.2015.7208635}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/BalkanliZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DaneshZWMTY15, author = {Wafi Danesh and Chenyuan Zhao and Bryant T. Wysocki and Michael J. Medley and Ngwe Thawdar and Yang Yi}, title = {Channel estimation in wireless {OFDM} systems using reservoir computing}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208638}, doi = {10.1109/CISDA.2015.7208638}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DaneshZWMTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/DonahueMSDOKW15, author = {Colin Donahue and Cory E. Merkel and Qutaiba Saleh and Levs Dolgovs and Yu Kee Ooi and Dhireesha Kudithipudi and Bryant T. Wysocki}, title = {Design and analysis of neuromemristive echo state networks with limited-precision synapses}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208623}, doi = {10.1109/CISDA.2015.7208623}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/DonahueMSDOKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/GoudarziSS15, author = {Alireza Goudarzi and Alireza Shabani and Darko Stefanovic}, title = {Exploring transfer function nonlinearity in echo state networks}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208637}, doi = {10.1109/CISDA.2015.7208637}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/GoudarziSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/JagannathSD15, author = {Jithin Jagannath and Hanne M. Saarinen and Andrew L. Drozd}, title = {Framework for automatic signal classification techniques {(FACT)} for software defined radios}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208628}, doi = {10.1109/CISDA.2015.7208628}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisda/JagannathSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KaneB15, author = {Matthew Kane and Daniel Bennett}, title = {Detecting Push to Talk radios using two tone intermodulation distortion}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208629}, doi = {10.1109/CISDA.2015.7208629}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KaneB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/KovalerchukP15, author = {Boris Kovalerchuk and Leonid I. Perlovsky}, title = {Rigorous sensor resource management: Methodology and evolutionary optimization}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208621}, doi = {10.1109/CISDA.2015.7208621}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/KovalerchukP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LevchukB15, author = {Georgiy Levchuk and Erik Blasch}, title = {Probabilistic graphical models for multi-source fusion from text sources}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208640}, doi = {10.1109/CISDA.2015.7208640}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LevchukB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LiLYYSLCZWJ15, author = {Hai (Helen) Li and Chenchen Liu and Bonan Yan and Chaofei Yang and Linghao Song and Zheng Li and Yiran Chen and Weijie Zhu and Qing Wu and Hao Jiang}, title = {Spiking-based matrix computation by leveraging memristor crossbar array}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208626}, doi = {10.1109/CISDA.2015.7208626}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LiLYYSLCZWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Liu15, author = {Ziqian Liu}, title = {Risk sensitive optimal synchronization of coupled stochastic neural networks with chaotic phenomena}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208632}, doi = {10.1109/CISDA.2015.7208632}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/LoeMD15, author = {Richard Loe and Christopher Maracchion and Andrew L. Drozd}, title = {Semi-autonomous management of multiple ad-hoc teams of UAVs}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208620}, doi = {10.1109/CISDA.2015.7208620}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/LoeMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ManemBXCGC15, author = {Harika Manem and Karsten Beckmann and Min Xu and Robert Carroll and Robert E. Geer and Nathaniel C. Cady}, title = {An extendable multi-purpose 3D neuromorphic fabric using nanoscale memristors}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208625}, doi = {10.1109/CISDA.2015.7208625}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ManemBXCGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MiaoHTHDR15, author = {Sheng Miao and Robert J. Hammell II and Ziying Tang and Timothy P. Hanratty and John Dumer and John T. Richardson}, title = {Integrating complementary/contradictory information into fuzzy-based VoI determinations}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208636}, doi = {10.1109/CISDA.2015.7208636}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MiaoHTHDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/MurtazaKHG15, author = {Syed Shariyar Murtaza and Wael Khreich and Abdelwahab Hamou{-}Lhadj and St{\'{e}}phane Gagnon}, title = {A trace abstraction approach for host-based anomaly detection}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208644}, doi = {10.1109/CISDA.2015.7208644}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/MurtazaKHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NelsonCAKTB15, author = {Kevin Nelson and George Corbin and Mark Anania and Matthew Kovacs and Jeremy Tobias and Misty K. Blowers}, title = {Evaluating model drift in machine learning algorithms}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208643}, doi = {10.1109/CISDA.2015.7208643}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NelsonCAKTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/NjillaP15, author = {Laurent Yamen Njilla and Niki Pissinou}, title = {Dynamics of data delivery in mobile ad-hoc networks: {A} bargaining game approach}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208634}, doi = {10.1109/CISDA.2015.7208634}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/NjillaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Patel15, author = {Hiren Patel}, title = {Non-parametric feature generation for RF-fingerprinting on ZigBee devices}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208645}, doi = {10.1109/CISDA.2015.7208645}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Patel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ReynoldsCES15, author = {Joshua Reynolds and Lauren A. Christopher and Russ Eberhart and Patrick Shaffer}, title = {Using computational swarm intelligence for real-time asset allocation}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208619}, doi = {10.1109/CISDA.2015.7208619}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ReynoldsCES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/RodriguezKK15, author = {Manuel Rodr{\'{\i}}guez and Kevin A. Kwiat and Charles A. Kamhoua}, title = {On the use of design diversity in fault tolerant and secure systems: {A} qualitative analysis}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208639}, doi = {10.1109/CISDA.2015.7208639}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/RodriguezKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/SalehMKW15, author = {Qutaiba Saleh and Cory E. Merkel and Dhireesha Kudithipudi and Bryant T. Wysocki}, title = {Memristive computational architecture of an echo state network for real-time speech-emotion recognition}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208624}, doi = {10.1109/CISDA.2015.7208624}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/SalehMKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Schafer15, author = {Carlo Sch{\"{a}}fer}, title = {Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadata}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208641}, doi = {10.1109/CISDA.2015.7208641}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Schafer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/Schaffer15, author = {J. David Schaffer}, title = {Evolving spiking neural networks: {A} novel growth algorithm corrects the teacher}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208630}, doi = {10.1109/CISDA.2015.7208630}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/Schaffer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhaoDWY15, author = {Chenyuan Zhao and Wafi Danesh and Bryant T. Wysocki and Yang Yi}, title = {Neuromorphic encoding system design with chaos based {CMOS} analog neuron}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208631}, doi = {10.1109/CISDA.2015.7208631}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhaoDWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisda/ZhaoKKR15, author = {Hong Zhao and Kevin A. Kwiat and Charles A. Kamhoua and Manuel Rodr{\'{\i}}guez}, title = {Applying chaos theory for runtime Hardware Trojan detection}, booktitle = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CISDA.2015.7208642}, doi = {10.1109/CISDA.2015.7208642}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/ZhaoKKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisda/2015, title = {2015 {IEEE} Symposium on Computational Intelligence for Security and Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7165058/proceeding}, isbn = {978-1-4673-7557-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisda/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.