Author of the publication

Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.

, , , , , , , , , , and . AVSS, page 307-312. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations., , , , , , , , , and 1 other author(s). AVSS, page 307-312. IEEE Computer Society, (2007)A cross-cultural study of the effect of a graph-oriented computer-assisted project-based learning environment on middle school students' science knowledge and argumentation skills., , , and . J. Comput. Assist. Learn., 32 (1): 51-76 (2016)Combined adductor transfer, iliopsoas release, and proximal hamstring release in cerebral palsy., and . J Pediatr Orthop, 9 (1): 1--5 (1989)The effect of a graph-oriented computer-assisted project-based learning environment on argumentation skills., , , and . J. Comput. Assist. Learn., 31 (1): 32-58 (2015)Neural-network applications for analysis of adverse drug reactions., , and . Biomedical instrumentation & technology / Association for the Advancement of Medical Instrumentation, 27 (5): 408-11 (1993)2662.Exact reconstruction analysis/synthesis filter banks with time-varying filters., and . ICASSP (3), page 233-236. IEEE Computer Society, (1993)An efficient motion estimation technique based on a rate-distortion criterion., , and . ICASSP, page 1926-1929. IEEE Computer Society, (1996)Expert Summaries., , , , , , , and . ICASSP, page 9-10. IEEE Computer Society, (1997)Trellis-coded residual vector quantization: its geometrical advantages and application to image coding., , and . ICASSP, page 2617-2620. IEEE, (2000)Fingerprint image enhancement using a binary angular representation., and . ICASSP, page 1561-1564. IEEE, (2001)