default search action
Intelligent Methods for Cyber Warfare 2015
- Ronald R. Yager, Marek Z. Reformat, Naif Alajlan:
Intelligent Methods for Cyber Warfare. Studies in Computational Intelligence 563, Springer 2015, ISBN 978-3-319-08623-1 - Charles LeDoux, Arun Lakhotia:
Malware and Machine Learning. 1-42 - Dan E. Tamir, Naphtali David Rishe, Mark Last, Abraham Kandel:
Soft Computing Based Epidemical Crisis Prediction. 43-67 - Fei-Yue Wang, Xiaochen Li, Wenji Mao:
An ACP-Based Approach to Intelligence and Security Informatics. 69-86 - Oleg Chertov, Dan Tavrov:
Microfiles as a Potential Source of Confidential Information Leakage. 87-114 - Daniel Ortiz Arroyo:
Decision Support in Open Source Intelligence. 115-127 - James Llinas:
Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype. 129-149 - Robin Wikström, József Mezei:
Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures. 151-172 - Gulshan Kumar, Krishan Kumar:
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. 173-200 - Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu:
Cyber Insider Mission Detection for Situation Awareness. 201-217 - Allen Ott, Alex Moir, John T. Rickard:
A Game Theoretic Engine for Cyber Warfare. 219-237 - Jared Holsopple, Shanchieh Jay Yang, Moises Sudit:
Mission Impact Assessment for Cyber Warfare. 239-266 - Suchitra Abel:
Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. 267-278
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.