The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix pr...
ISBN:
(纸本)9781424437641
The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm;dynamical networks as a tool for system analysis and exploration;a detailed analysis of the KDD cup 99 data set;BlastSim - multi agent simulation of suicide bombing;evolution and evaluation of biometric systems;information assurances and threat identification in networked organizations;neural-based iterative approach for iris detection in iris recognition systems;machine learning based encrypted traffic classification: identifying SSH and Skype;multiple UAV teams for multiple tasks;passive multitarget tracking using transmitters of opportunity;application of voiced-speech variability descriptors to emotion recognition;and integrating reasoning with personality effects in simulated operators.
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of milit...
ISBN:
(纸本)9781467359115
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of military combat units through weight-based terrain analysis using NASA world wind;testing a distributed denial of service defense mechanism using red teaming;multiple UAV area decomposition and coverage;cooperative path planning for UAVs with UAV loss considerations;neural adaptive flight controller for ducted-fan UAV performing nonlinear maneuver;a novel obstacle avoidance control algorithm in a dynamic environment;design of a nonlinear dynamic inversion controller for trajectory following and maneuvering for fixed wing aircraft;and investigating application behavior in network traffic traces.
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using hig...
ISBN:
(纸本)9781424499410
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using high level GPU programming for maritime operations support;clustering of tracklets for on-line multi-target tracking in networked camera systems;modelling search and rescue systems with dynamical networks;sensor network management using multiobjective evolutionary optimization;object set matching with an evolutionary algorithm;computation of most threatening radar trajectories areas and corridors based on fast-marching & level sets;accelerating common operational pictures through network consensus;complex decision making experimental platform (CODEM): a counter-insurgency scenario;high-dimensional objective-based data farming;and multi-objective evolutionary optimization of a military air transportation fleet mix with the flexibility objective.
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in...
详细信息
ISBN:
(纸本)1424407001
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in military missions;solving multicommodity capacitated network design problems using a multiodjective evolutionary algorithm;computational verification of system architectures;next generation end-to-end logistics decision support tools. Evolutionary logistics planning;face recognition system using ant colony optimization-based selected features;improved missile route planning and targeting using game-based computationalintelligence;a review of intelligent systems software for autonomous vehicles;computationalintelligence support for smart queries and adaptive data;and a template-based method for force group classification in situation assessment.
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dyn...
ISBN:
(纸本)9781467375573
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dynamic asset allocation for counter-smuggling operations under disconnected, intermittent and low-bandwidth environment;design and analysis of neuromemristive echo state networks with limited-precision synapses;memristive computational architecture of an echo state network for real-time speech-emotion recognition;spiking-based matrix computation by leveraging memristor crossbar array;design of experiments based empirical models to support cognitive radio decision making;detecting push to talk radios using two tone intermodulation distortion;and evolving spiking neural networks: a novel growth algorithm corrects the teacher.
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion de...
ISBN:
(纸本)9781479954315
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion detection system using discrete Fourier transform;a simple braking model for detecting incidents locations by smartphones;a hybrid framework for enhancing correlation to solve cold-start problem in recommender systems;an improved memetic algorithm to enhance the sustainability and reliability of transport in container terminals;automated generation of ham rules for Vietnamese spam filtering;design of takagi-sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jet;and behavior-driven video analytics system for critical infrastructure protection.
The 2011 ieee symposium on computational intelligence for security and defense applications will present a wide range of applications to very challenging problems in the security and defense domains. ieeecisda 2011, ...
The 2011 ieee symposium on computational intelligence for security and defense applications will present a wide range of applications to very challenging problems in the security and defense domains. ieeecisda 2011, the fourth such forum (the first was held in 2007), aims to present the most recent results on computationalintelligence technologies and their applications to security, defense and military problems. The following topics will be discussed at the symposium: mine detection, complex adaptive systems, radar systems, modeling and simulation of military operations, network security, and maritime applications.
The following topics are dealt with: computationalintelligence; security of data; defense application; military computing; image processing and evolutionary computation
The following topics are dealt with: computationalintelligence; security of data; defense application; military computing; image processing and evolutionary computation
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. This paper presents a machine learning based approach to identify...
详细信息
ISBN:
(纸本)9781467359115
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. This paper presents a machine learning based approach to identify high level application behavior in a given traffic trace using a holistic approach without looking into the content or without checking a static attribute. We demonstrate the effectiveness of our approach as a forensic analysis tool on five encrypted applications namely SSH, Skype, Gtalk, SSL (No Web) and HTTPS (Web Browsing), using traces captured from different networks. Results indicate that it is possible to identify high level application behavior such as unencrypted versus encrypted as well as identifying services running in encrypted tunnels.
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attack...
详细信息
ISBN:
(纸本)9781467359115
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attacks has rapidly grown in frequency, severity, and sophistication in recent years. Thus, serious attention needs to be paid to network security. However, to create a secure network that can stay ahead of all threats, detection and response features are real challenges. In this paper, we look at the the interaction between the attacker and the defender in a Red Team/Blue Team exercise. We also propose a quantitative decision framework which is able to provide optimal solutions to defend against well-organized and sophisticated attacks. A large number of possible scenarios for testing of DoS defences will be examined through this framework in order to help experts to improve decisions regarding optimal solutions to defend against DoS threats.
暂无评论