default search action
CISDA 2014: Cau Giay, Vietnam
- Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2014, Cau Giay, Vietnam, December 14-17, 2014. IEEE 2014, ISBN 978-1-4799-5431-5
- Pawat Chusilp, Weerawut Charubhun, Otsin Nilubol:
Effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness. 1-7 - Thi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen:
Malware detection using genetic programming. 1-6 - Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Intrusion detection system using Discrete Fourier Transform. 1-5 - Viet-Chau Dang, Masao Kubo, Hiroshi Sato, Akihiro Yamaguchi, Akira Namatame:
A simple braking model for detecting incidents locations by smartphones. 1-5 - Thai Thinh Dang, Trong Hai Duong, Hong Son Nguyen:
A hybrid framework for enhancing correlation to solve cold-start problem in recommender systems. 1-5 - Shayan Kavakeb, Trung Thanh Nguyen, Mohamed Benmerikhi, Zaili Yang, Ian Jenkinson:
An improved memetic algorithm to enhance the sustainability and reliability of transport in container terminals. 1-8 - Quan Dang Dinh, Quang-Anh Tran, Frank Jiang:
Automated generation of ham rules for Vietnamese spam filtering. 1-5 - Cao Huu Tinh, Vu Hoa Tien, Nguyen Cong Dinh, Ngoc Anh Mai:
Design of Takagi-Sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jet. 1-7 - Phillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu:
Behavior-driven video analytics system for critical infrastructure protection. 1-8 - Nguyen Hoai Anh:
A multi-objective method for discovery of pathways in protein-protein interaction networks. 1-7 - Eduard Avedyan, Alexander I. Galushkin, Dmitry V. Pantiukhin:
Neural network technologies for information systems security. 1-5 - Vincent Barnabe-Lortie, Colin Bellinger, Nathalie Japkowicz:
Smoothing gamma ray spectra to improve outlier detection. 1-8 - Long Nguyen, Anh Quang Tran, Lam Thu Bui:
DMEA-II and its application on spam email detection problems. 1-6 - Ngoc Tran Nguyen:
An efficient LBP-based descriptor for real-time object detection. 1-5 - Mau Uyen Nguyen, Thanh Tinh Dao, Long Thanh Ngo:
A fuzzy-based approach for approximating depth information in RGB-D images. 1-5 - Dung H. Phan, Junichi Suzuki:
R2-BEAN: R2 indicator based evolutionary algorithm for noisy multiobjective optimization. 1-8 - Bao Nguyen, Md. Suruz Miah:
Analysis of maritime air defence scenarios. 1-8 - Md. Suruz Miah, Bao Nguyen, Davide Spinello, Wail Gueaieb:
Maritime air defence firing tactics. 1-9 - Minh Hoang Trinh, Kwang-Kyo Oh, Hyo-Sung Ahn:
Control of a mobile agent using only bearing measurements in triangular region. 1-5 - Rafael Falcon, Rami S. Abielmona, Sean Billings, Alex Plachkov, Hussein A. Abbass:
Risk management with hard-soft data fusion in maritime domain awareness. 1-8 - Nguyen Van Nhuong, Vo Thi Yen Nhi, Cam Nguyen Tan, Phu Xuan Mai, Tan Cao Dang:
SSSM-semantic set and string matching based malware detection. 1-6 - Nguyen Manh Hung, Vu Duy Nhat:
B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. 1-6 - Eleni Petraki, Hussein A. Abbass:
On trust and influence: A computational red teaming game theoretic perspective. 1-7 - Hoang Anh Q. Tran, Akira Namatame, Augie Widyotriatmo, Endra Joelianto:
An optimization procedure for enhancing network robustness against cascading failures. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.