咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 50 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 20 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 military computi...
  • 11 篇 testing
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 149 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
150 条 记 录,以下是71-80 订阅
排序:
Clustering of tracklets for on-line multi-target tracking in networked camera systems
Clustering of tracklets for on-line multi-target tracking in...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Julien A. Vijverberg Cornelis J. Koeleman Peter H.N. de With Eindhovan University of Technology Eindhoven Netherlands VDG Security B.V. Zoetermeer Netherlands
This paper considers the problem of tracking a variable number of objects through a surveillance site monitored by multiple cameras with slightly overlapping field-of-views. To this end, we propose to cluster tracklet... 详细信息
来源: 评论
An optimization procedure for enhancing network robustness against cascading failures
An optimization procedure for enhancing network robustness a...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Hoang Anh Q. Tran Akira Namatame Augie Widyotriatmo Endra Joelianto Dept. of Computer Science National Defense Academy of Japan Yokosuka Kanagawa Japan Faculty of Industrial Technology Institut Teknologi Bandung Bandung Indonesia Dept. of Computer Science National Defense Academy of Japan Yokosuka Kanagawa Japan
Complex network theory has recently been used as a framework to describe the behavior of several networks in nature including physical, chemical, biological, technological and social networks. Some of those, such as e... 详细信息
来源: 评论
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis
On the use of design diversity in fault tolerant and secure ...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Manuel Rodriguez Kevin A. Kwiat Charles A. Kamhoua Cyber Assurance Branch Air Force Research Laboratory Information Directorate Rome NY USA
The design and development of modern critical systems, including cyber-physical systems, is experiencing a greater reliance on the outsourcing of systems parts and the use of third-party components and tools. These is... 详细信息
来源: 评论
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation
Algorithmic Tools for Adversarial Games: Intent Analysis Usi...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Tasha Vanesian Ken Kreutz-Delgado George Burgin David Fogel ECE Department Univ. of California San Diego La Jolla CA USA Natural Selection La Jolla CA
Determining adversarial intent is important on a battlefield. In this paper, we propose a method for intent analysis using evolutionary computation. The proposed approach defines the model as an optimization problem t... 详细信息
来源: 评论
computational Verification of System Architectures
Computational Verification of System Architectures
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Abbas K. Zaidi Alexander H. Levis System Architectures Laboratory ECE Department MS 1G5 George Mason University Fairfax VA USA
The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to... 详细信息
来源: 评论
High-dimensional objective-based data farming
High-dimensional objective-based data farming
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Fanchao Zeng James Decraene Malcolm Yoke Hean Low Cai Wentong Philip Hingston Suiping Zhou School of Computer Engineering Nanyang Technological University Singapore School of Computer and Security Science Edith Cowan University Australia School of Computing Teesside University UK
In objective-based data farming, decision variables of the Red Team are evolved using evolutionary algorithms such that a series of rigorous Red Team strategies can be generated to assess the Blue Team's operation... 详细信息
来源: 评论
Autonomous control laws for mobile robotic surveillance swarms
Autonomous control laws for mobile robotic surveillance swar...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Robert J. Mullen Dorothy N. Monekosso Sarah A. Barman Paolo Remagnino Digital Image Research Centre CISM Kingston University London UK Centre for Adaptive Wireless Systems Cork Institute of Technology Ireland
We investigate the use of artificial local forces governed by physics laws for the spatial formation and coordination of a swarm of VTOL UAVs for ground area surveillance applications. Varying parameter effects are in... 详细信息
来源: 评论
Improved Missile Route Planning and Targeting using Game-Based computational intelligence
Improved Missile Route Planning and Targeting using Game-Bas...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Ken Doris David Silvia Applied Visions Inc. Northport NY USA Naval Undersea Warfare Center Newport RI USA
This paper discusses a research project that employs computational intelligence (CI) to improve the ability of military planners to route sensors and weapons to effectively engage mobile targets. Future target motion ... 详细信息
来源: 评论
Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm
Minimizing risk on a fleet mix problem with a multiobjective...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, cisda
作者: Michael Mazurek Slawomir Wesolkowski Mathematical Physics University of Waterloo Canada DRDC CORA in Ottawa Canada
We apply the non-dominated sorting genetic algorithm-II (NSGA-II) to perform a multiobjective optimization of the stochastic fleet estimation (SaFE) model. SaFE is a Monte Carlo-based model which generates a vehicle f... 详细信息
来源: 评论
Testing A Distributed Denial of Service Defence Mechanism Using Red Teaming
Testing A Distributed Denial of Service Defence Mechanism Us...
收藏 引用
ieee symposium on computational intelligence for security and defense applications
作者: Samaneh Rastegari Philip Hingston Chiou-Peng Lam Murray Brand School of Computer and Security Science Edith Cowan University WA 6050 Australia
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attack... 详细信息
来源: 评论