Author of the publication

A Review of Anomaly Detection in Automated Surveillance.

, , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1257-1272 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies., , , and . Int. J. Comput. Games Technol., (2011)The Effects of Individual Differences, Non-Stationarity, and the Importance of Data Partitioning Decisions for Training and Testing of EEG Cross-Participant Models., , and . Sensors, 21 (9): 3225 (2021)Cross-Participant EEG-Based Assessment of Cognitive Workload Using Multi-Path Convolutional Recurrent Neural Networks., , , , and . Sensors, 18 (5): 1339 (2018)Learning Set Representations for LWIR In-Scene Atmospheric Compensation., , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2020)The Environment Value of an Opponent Model.. IEEE Trans. Syst. Man Cybern. Part B, 40 (3): 623-633 (2010)Partially autoregressive machine learning: Development and testing of methods to predict United States Air Force retention., , , and . Comput. Ind. Eng., (2022)Beyond Correlation: A Path-Invariant Measure for Seismogram Similarity., , , and . CoRR, (2019)Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System., , , , and . HICSS, page 5310-5319. IEEE Computer Society, (2015)Understanding conditions that lead to emulation attacks in dynamic spectrum access., , , and . IEEE Communications Magazine, 49 (3): 32-37 (2011)A Review of Anomaly Detection in Automated Surveillance., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1257-1272 (2012)