National Center for Multisource Information Fusion
暂无分享,去创建一个
Stuart C. Shapiro | Rakesh Nagi | Moises Sudit | Zhang Ying | Jared Holsopple | Shanchieh Jay Yang | David L. Hall | Mike Kuhl | Brian Panulla | Mike Kandefer | Patrice Seyed | Adhijit Gosavi | Kevin Costantini | Greg Tauer
[1] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[2] S. Goldberg,et al. Introduction to Difference Equations , 1958 .
[3] Stuart C. Shapiro. SNePS: a logic for natural language understanding and commonsense reasoning , 2000 .
[4] Mark A. Turnquist,et al. Assessing the performance of interdependent infrastructures and optimizing investments , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[5] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[6] Shanchieh Jay Yang,et al. Terrain and behavior modeling for projecting multistage cyber attacks , 2007, 2007 10th International Conference on Information Fusion.
[7] E.A. Lee,et al. Synchronous data flow , 1987, Proceedings of the IEEE.
[8] S. Elaydi. An introduction to difference equations , 1995 .
[9] Adam Stotz,et al. Situational awareness of a coordinated cyber attack , 2005, SPIE Defense + Commercial Sensing.
[10] James Llinas,et al. A framework for dynamic hard/soft fusion , 2008, 2008 11th International Conference on Information Fusion.
[11] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[12] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[13] Shanchieh Jay Yang,et al. VTAC: virtual terrain assisted impact assessment for cyber attacks , 2008, SPIE Defense + Commercial Sensing.
[14] Edward A. Lee,et al. Causality interfaces for actor networks , 2008, TECS.
[15] Adam Stotz,et al. INformation fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking , 2007, 2007 10th International Conference on Information Fusion.
[16] Stuart C. Shapiro,et al. Symbolic Reasoning in the Cyber Security Domain , 2007 .
[17] Adam Stotz,et al. Measuring situational awareness and resolving inherent high-level fusion obstacles , 2006, SPIE Defense + Commercial Sensing.
[18] Kenneth D. Forbus,et al. Building Problem Solvers , 1993 .
[19] Larry Wos,et al. Automated Reasoning: Introduction and Applications , 1984 .
[20] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[21] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[22] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.