Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation and validation of EO-1 Hyperion for geologic mapping., , , , and . IGARSS, page 593-595. IEEE, (2002)Proceduralism and parallelism in specification languages., and . Inf. Syst., 5 (2): 97-106 (1980)AutoCorrel II: a neural network event correlation approach., , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 65700H. SPIE, (2007)Hybrid Systems for Prediction - A Case Study of Predicting Effluent Flow to a Sewage Plant., , , , and . ANNES, page 261-264. IEEE Computer Society, (1995)Assessment of the stability of the Hyperion SWIR module for hyperspectral mineral mapping using multi-date images from Mount Fitton, Australia., , , , , , and . IGARSS, page 3504-3506. IEEE, (2002)Using Unsupervised Learning for Network Alert Correlation., , , and . Canadian AI, volume 5032 of Lecture Notes in Computer Science, page 308-319. Springer, (2008)Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems., , , and . IFIPTM, volume 238 of IFIP, page 185-206. Springer, (2007)Mapping the effects of regional metamorphism and hydrothermal alteration in the Mount Isa Valley, Queensland, Australia, using airborne hyperspectral data., , , , and . IGARSS, page 1555-1557. IEEE, (2003)Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents., , , and . SSS, volume 7596 of Lecture Notes in Computer Science, page 299-313. Springer, (2012)Using covert timing channels for attack detection in MANETs., , and . MILCOM, page 1-7. IEEE, (2012)