Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Incorporating Visual Imagery into a Cognitive Architecture, and . Proceedings of the Eighth International Conference on Cognitive Modeling, page 25-30. Ann Arbor, MI, (2007)Towards a definition of cyberspace tactics, techniques and procedures., , , and . IEEE BigData, page 4674-4679. IEEE Computer Society, (2017)Networked Intelligent Munitions and Sensor System., , , and . IKE, page 3-9. CSREA Press, (2009)Extending Cognitive Architectures with Spatial and Visual Imagery Mechanisms.. University of Michigan, USA, (2008)A Virtual Environment for IA Education., , and . IAW, page 17-23. IEEE, (2003)AI and Mental Imagery., and . AAAI Fall Symposium: Naturally-Inspired Artificial Intelligence, volume FS-08-06 of AAAI Technical Report, page 111-. AAAI, (2008)Wirless Security Threat Taxonomy., and . IAW, page 76-83. IEEE, (2003)Exploring the Functional Advantages of Spatial and Visual Cognition From an Architectural Perspective., , and . Top. Cogn. Sci., 3 (4): 796-818 (2011)A Comprehensive Undergraduate Information Assurance Program., , , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 243-260. Kluwer, (2003)Information Warfare in the Trenches., , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 19-39. Kluwer, (2003)