Search dblp for Publications

export results for "toc:db/conf/cisda/cisda2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cisda/AmannaAFR15,
  author       = {Ashwin E. Amanna and
                  Daniel Ali and
                  David Gonzalez Fitch and
                  Jeffrey H. Reed},
  title        = {Design of experiments based empirical models to support cognitive
                  radio decision making},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208627},
  doi          = {10.1109/CISDA.2015.7208627},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AmannaAFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AndersonD15,
  author       = {Gustave Anderson and
                  David J. Dorsey},
  title        = {Ternary trust metric for mobile ad-hoc networks},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208633},
  doi          = {10.1109/CISDA.2015.7208633},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AndersonD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/AvvariSMZNPH15,
  author       = {Gopi Vinod Avvari and
                  David Sidoti and
                  Manisha Mishra and
                  Lingyi Zhang and
                  Bala Kishore Nadella and
                  Krishna R. Pattipati and
                  James A. Hansen},
  title        = {Dynamic asset allocation for counter-smuggling operations under disconnected,
                  intermittent and low-bandwidth environment},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208622},
  doi          = {10.1109/CISDA.2015.7208622},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/AvvariSMZNPH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BalasingamPLR15,
  author       = {Balakumar Balasingam and
                  Krishna R. Pattipati and
                  Georgiy M. Levchuk and
                  John C. Romano},
  title        = {Robust collaborative learning by multi-agents},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208646},
  doi          = {10.1109/CISDA.2015.7208646},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/BalasingamPLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/BalkanliZ15,
  author       = {Eray Balkanli and
                  Nur Zincir{-}Heywood},
  title        = {Highlights on analyzing one-way traffic using different tools},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208635},
  doi          = {10.1109/CISDA.2015.7208635},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/BalkanliZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DaneshZWMTY15,
  author       = {Wafi Danesh and
                  Chenyuan Zhao and
                  Bryant T. Wysocki and
                  Michael J. Medley and
                  Ngwe Thawdar and
                  Yang Yi},
  title        = {Channel estimation in wireless {OFDM} systems using reservoir computing},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208638},
  doi          = {10.1109/CISDA.2015.7208638},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DaneshZWMTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/DonahueMSDOKW15,
  author       = {Colin Donahue and
                  Cory E. Merkel and
                  Qutaiba Saleh and
                  Levs Dolgovs and
                  Yu Kee Ooi and
                  Dhireesha Kudithipudi and
                  Bryant T. Wysocki},
  title        = {Design and analysis of neuromemristive echo state networks with limited-precision
                  synapses},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208623},
  doi          = {10.1109/CISDA.2015.7208623},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/DonahueMSDOKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/GoudarziSS15,
  author       = {Alireza Goudarzi and
                  Alireza Shabani and
                  Darko Stefanovic},
  title        = {Exploring transfer function nonlinearity in echo state networks},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208637},
  doi          = {10.1109/CISDA.2015.7208637},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/GoudarziSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/JagannathSD15,
  author       = {Jithin Jagannath and
                  Hanne M. Saarinen and
                  Andrew L. Drozd},
  title        = {Framework for automatic signal classification techniques {(FACT)}
                  for software defined radios},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208628},
  doi          = {10.1109/CISDA.2015.7208628},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisda/JagannathSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KaneB15,
  author       = {Matthew Kane and
                  Daniel Bennett},
  title        = {Detecting Push to Talk radios using two tone intermodulation distortion},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208629},
  doi          = {10.1109/CISDA.2015.7208629},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KaneB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/KovalerchukP15,
  author       = {Boris Kovalerchuk and
                  Leonid I. Perlovsky},
  title        = {Rigorous sensor resource management: Methodology and evolutionary
                  optimization},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208621},
  doi          = {10.1109/CISDA.2015.7208621},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/KovalerchukP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LevchukB15,
  author       = {Georgiy Levchuk and
                  Erik Blasch},
  title        = {Probabilistic graphical models for multi-source fusion from text sources},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208640},
  doi          = {10.1109/CISDA.2015.7208640},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LevchukB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LiLYYSLCZWJ15,
  author       = {Hai (Helen) Li and
                  Chenchen Liu and
                  Bonan Yan and
                  Chaofei Yang and
                  Linghao Song and
                  Zheng Li and
                  Yiran Chen and
                  Weijie Zhu and
                  Qing Wu and
                  Hao Jiang},
  title        = {Spiking-based matrix computation by leveraging memristor crossbar
                  array},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208626},
  doi          = {10.1109/CISDA.2015.7208626},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LiLYYSLCZWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Liu15,
  author       = {Ziqian Liu},
  title        = {Risk sensitive optimal synchronization of coupled stochastic neural
                  networks with chaotic phenomena},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208632},
  doi          = {10.1109/CISDA.2015.7208632},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Liu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/LoeMD15,
  author       = {Richard Loe and
                  Christopher Maracchion and
                  Andrew L. Drozd},
  title        = {Semi-autonomous management of multiple ad-hoc teams of UAVs},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208620},
  doi          = {10.1109/CISDA.2015.7208620},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/LoeMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ManemBXCGC15,
  author       = {Harika Manem and
                  Karsten Beckmann and
                  Min Xu and
                  Robert Carroll and
                  Robert E. Geer and
                  Nathaniel C. Cady},
  title        = {An extendable multi-purpose 3D neuromorphic fabric using nanoscale
                  memristors},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208625},
  doi          = {10.1109/CISDA.2015.7208625},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ManemBXCGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MiaoHTHDR15,
  author       = {Sheng Miao and
                  Robert J. Hammell II and
                  Ziying Tang and
                  Timothy P. Hanratty and
                  John Dumer and
                  John T. Richardson},
  title        = {Integrating complementary/contradictory information into fuzzy-based
                  VoI determinations},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208636},
  doi          = {10.1109/CISDA.2015.7208636},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MiaoHTHDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/MurtazaKHG15,
  author       = {Syed Shariyar Murtaza and
                  Wael Khreich and
                  Abdelwahab Hamou{-}Lhadj and
                  St{\'{e}}phane Gagnon},
  title        = {A trace abstraction approach for host-based anomaly detection},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208644},
  doi          = {10.1109/CISDA.2015.7208644},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/MurtazaKHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NelsonCAKTB15,
  author       = {Kevin Nelson and
                  George Corbin and
                  Mark Anania and
                  Matthew Kovacs and
                  Jeremy Tobias and
                  Misty K. Blowers},
  title        = {Evaluating model drift in machine learning algorithms},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208643},
  doi          = {10.1109/CISDA.2015.7208643},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NelsonCAKTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/NjillaP15,
  author       = {Laurent Yamen Njilla and
                  Niki Pissinou},
  title        = {Dynamics of data delivery in mobile ad-hoc networks: {A} bargaining
                  game approach},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208634},
  doi          = {10.1109/CISDA.2015.7208634},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/NjillaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Patel15,
  author       = {Hiren Patel},
  title        = {Non-parametric feature generation for RF-fingerprinting on ZigBee
                  devices},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208645},
  doi          = {10.1109/CISDA.2015.7208645},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Patel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ReynoldsCES15,
  author       = {Joshua Reynolds and
                  Lauren A. Christopher and
                  Russ Eberhart and
                  Patrick Shaffer},
  title        = {Using computational swarm intelligence for real-time asset allocation},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208619},
  doi          = {10.1109/CISDA.2015.7208619},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ReynoldsCES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/RodriguezKK15,
  author       = {Manuel Rodr{\'{\i}}guez and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua},
  title        = {On the use of design diversity in fault tolerant and secure systems:
                  {A} qualitative analysis},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208639},
  doi          = {10.1109/CISDA.2015.7208639},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/RodriguezKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/SalehMKW15,
  author       = {Qutaiba Saleh and
                  Cory E. Merkel and
                  Dhireesha Kudithipudi and
                  Bryant T. Wysocki},
  title        = {Memristive computational architecture of an echo state network for
                  real-time speech-emotion recognition},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208624},
  doi          = {10.1109/CISDA.2015.7208624},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/SalehMKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Schafer15,
  author       = {Carlo Sch{\"{a}}fer},
  title        = {Detection of compromised email accounts used for spamming in correlation
                  with mail user agent access activities extracted from metadata},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208641},
  doi          = {10.1109/CISDA.2015.7208641},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Schafer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/Schaffer15,
  author       = {J. David Schaffer},
  title        = {Evolving spiking neural networks: {A} novel growth algorithm corrects
                  the teacher},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208630},
  doi          = {10.1109/CISDA.2015.7208630},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/Schaffer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhaoDWY15,
  author       = {Chenyuan Zhao and
                  Wafi Danesh and
                  Bryant T. Wysocki and
                  Yang Yi},
  title        = {Neuromorphic encoding system design with chaos based {CMOS} analog
                  neuron},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208631},
  doi          = {10.1109/CISDA.2015.7208631},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhaoDWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisda/ZhaoKKR15,
  author       = {Hong Zhao and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Manuel Rodr{\'{\i}}guez},
  title        = {Applying chaos theory for runtime Hardware Trojan detection},
  booktitle    = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CISDA.2015.7208642},
  doi          = {10.1109/CISDA.2015.7208642},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/ZhaoKKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisda/2015,
  title        = {2015 {IEEE} Symposium on Computational Intelligence for Security and
                  Defense Applications, {CISDA} 2015, Verona, NY, USA, May 26-28, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7165058/proceeding},
  isbn         = {978-1-4673-7557-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisda/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics