Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations
暂无分享,去创建一个
David N. Chin | T. J. Smith | William K. Krebs | Paul C. Brewer | Gary M. Jackson | David Masters | Annetta Burger | A. Schmidt | Brian Banks | John J. Helly | Roger Medd
[1] Eric Horvitz,et al. The Lumière Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users , 1998, UAI.
[2] DAVID N. CHIN,et al. Introduction to the special issues on plan recognition , 2004, User Modeling and User-Adapted Interaction.
[3] John J. Helly,et al. Global distribution of naturally occurring marine hypoxia on continental margins , 2004 .
[4] Rong Wang,et al. Dynamic PKI and secure tuplespaces for distributed coalitions , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[5] Leonardo Garrido,et al. Dynamic Adaptive Opponent Modeling: Predicting Opponent Motion while Playing Soccer , 2005 .
[6] Timo Steffens. Feature-Based Declarative Opponent-Modelling , 2003, RoboCup.
[7] James Llinas,et al. Handbook of Multisensor Data Fusion , 2001 .
[8] Michael P. Wellman,et al. Accounting for Context in Plan Recognition, with Application to Traffic Monitoring , 1995, UAI.
[9] Manuela M. Veloso,et al. Recognizing Probabilistic Opponent Movement Models , 2001, RoboCup.