Author of the publication

» Moving from Measuring to Understanding: Situation Awareness in Homeland Security «

, , , , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Digioia, Giusj
add a person with the name Digioia, Giusj
 

Other publications of authors with the same name

Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks., , , and . EISIC, page 123-130. IEEE Computer Society, (2012)INFUSION: A system for situation and threat assessment in current and foreseen scenarios., and . CogSIMA, page 316-323. IEEE, (2012)Aware online interdependency modelling via evidence theory, , , and . International Journal of Critical Infrastructures 6, 9 (1-2): 74--92 (2013)Countermeasures Selection via Evidence Theory - (Short Paper)., , , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 218-222. Springer, (2011)» Moving from Measuring to Understanding: Situation Awareness in Homeland Security «, , , , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, (2013)Moving from measuring to understanding: Situation Awareness in Homeland Security, , , , and . Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC Press, Taylor & Francis eds., To Appear, (2013)An agile model for situation assessment: How to make Evidence Theory able to change idea about classifications., , and . FUSION, page 2118-2125. IEEE, (2012)Trajectory planner for a humanoid robot passing through a door., , and . Humanoids, page 134-141. IEEE, (2009)Countermeasures Selection via Evidence Theory, , , and . Critical Information Infrastructure Security, Springer Berlin Heidelberg, (2013)Countermeasures Selection via Evidence Theory, , , and . International Workshop on Critical Information Infrastructures Security, page 218--222. Springer, Berlin, Heidelberg, (2011)