Author of the publication

Game Theoretic Approach to Threat Prediction and Situation Awareness.

, , , , , and . J. Adv. Inf. Fusion, 2 (1): 35-48 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to chemical agent detection, classification, and estimation., , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730K. SPIE, (2008)Analysis and visualization of large complex attack graphs for networks security., , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657004. SPIE, (2007)Context Assumptions for Threat Assessment Systems., and . Context-Enhanced Information Fusion, Springer, (2016)SGCast: A New Forecasting Framework for Multilocation Geomagnetic Data With Missing Traces Based on Matrix Factorization., , , , , , and . IEEE Trans. Instrum. Meas., (2021)Optimal Placement of Heterogeneous Sensors for Targets with Gaussian Priors., , , and . IEEE Trans. Aerosp. Electron. Syst., 49 (3): 1637-1653 (2013)Navigation and Estimation Improvement by Environmental-Driven Noise Mode Detection., , , and . PLANS, page 925-932. IEEE, (2020)Special Issue: Dynamic Data-Driven Applications Systems (DDDAS) Concepts in Signal Processing., and . J. Signal Process. Syst., 88 (2): 203-204 (2017)A Study of Lightweight DDDAS Architecture for Real-Time Public Safety Applications Through Hybrid Simulation., , , and . WSC, page 762-773. IEEE, (2019)Deep Learning Approach for Data and Computing Efficient Situational Assessment and Awareness in Human Assistance and Disaster Response and Battlefield Damage Assessment Applications., , , , , and . DDDAS, volume 13984 of Lecture Notes in Computer Science, page 187-195. Springer, (2022)Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus., , , , and . SenSys, page 505-510. ACM, (2021)