Share Email Print
cover

PROCEEDINGS VOLUME 10185

Cyber Sensing 2017
Editor(s): Igor V. Ternovskiy; Peter Chin
For the purchase of this volume in printed format, please visit Proceedings.com

Volume Details

Volume Number: 10185
Date Published: 22 June 2017

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 10185
Author(s): Proceedings of SPIE
Modeling approaches for intrusion detection and prevention system return on investment
Author(s): Nandi O. Leslie; Lisa M. Marvel; Joshua Edwards; Kyra Comroe; Gregory Shearer; Lawrence Knachel
Show Abstract
Rootkits and the OS friendly microprocessor architecture
Author(s): Patrick Jungwirth; Thomas Barnett; Abdel-Hameed Badawy
Show Abstract
Machine learning for intrusion detection in mobile tactical networks
Author(s): Ken F. Yu; Richard E. Harang; Kerry N. Wood
Show Abstract
Using deep learning to detect network intrusions and malware in autonomous robots
Author(s): Andrew Jones; Jeremy Straub
Show Abstract
Extraction and validation of algorithms based on analog side-channels
Author(s): Ronald A. Riley; James T. Graham; Ryan M. Fuller; Rusty O. Baldwin; Ashwin Sampathkumar
Show Abstract
Characterization of Riscure 1-GHz low sensitivity probe for side channel analysis (SCA)
Author(s): James T. Graham; Rusty O. Baldwin; Ashwin Sampathkumar
Show Abstract
High-performance computing for automatic target recognition in synthetic aperture radar imagery
Author(s): Uttam Majumder; Erik Christiansen; Qing Wu; Nate Inkawhich; Erik Blasch; John Nehrbass
Show Abstract
Jaccard similarity-based quantification of the neighborhood stability of a node in mobile sensor networks
Author(s): Natarajan Meghanathan; Quavanti Hart
Show Abstract
Security in cloud computing based cognitive radio networks (Conference Presentation)
Author(s): Yenumula B. Reddy
Show Abstract
Multispectral very wide-view sensing concept
Author(s): A. O. Boryssenko
Show Abstract
Optimization of RF components in omnidirectional sensor
Author(s): A. O. Boryssenko
Show Abstract
Machine learning algorithm to detect unknown malicious codes
Author(s): Simon Khan; Uttam Majumder
Show Abstract
Detecting poisoning attacks on hierarchical malware classification systems
Author(s): Dan P. Guralnik; Bill Moran; Ali Pezeshki; Omur Arslan
Show Abstract
Classification and automatic recognition of objects using H2o package (Conference Presentation)
Author(s): Yenumula B. Reddy
Show Abstract
Apply analytical grid processing to sensor data collections
Author(s): Gregory Shlyuger
Show Abstract
Fusion of cyber sensors on a network for improved detection and classification
Author(s): Mark E. Oxley; Igor V. Ternovskiy
Show Abstract
Efficient non-resonant absorption of electromagnetic radiation in thin cylindrical targets: experimental evidence
Author(s): A. Akhmeteli; N. G. Kokodiy; B. V. Safronov; V. P. Balkashin; I. A. Priz; A. Tarasevitch
Show Abstract
Automatic similarity detection and clustering of data
Author(s): Craig Einstein; Peter Chin
Show Abstract
Applying self-structured data learning algorithm to aerial infrared and visual images
Author(s): Jenfeng Sam Li; Igor Ternovskiy; James Graham; Roman Ilin
Show Abstract

© SPIE. Terms of Use
Back to Top