Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Graph-Based Framework for Fusion: From Hypothesis Generation to Forensics., , , and . FUSION, page 1-8. IEEE, (2006)Decentralized cooperative urban tracking of multiple ground targets by a team of autonomous UAVs., , and . FUSION, page 1-7. IEEE, (2011)Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary)., , , , , and . FUSION, page 1-17. IEEE, (2010)Cyber attack modeling and simulation for network security analysis., , , and . WSC, page 1180-1188. WSC, (2007)A stochastic optimization framework for resource management and course of action analysis., , and . FUSION, page 1-7. IEEE, (2008)Significant information encapsulation and valence exploitation (SIEVE) for discovery., , , , and . FUSION, page 1-8. IEEE, (2011)A multi-perspective optimization approach to UAV resource management for littoral surveillance., , , , and . FUSION, page 492-498. IEEE, (2013)Discovering Patterns in Social Networks with Graph Matching Algorithms., , , , , and . SBP, volume 7812 of Lecture Notes in Computer Science, page 341-349. Springer, (2013)Attack Projection., , , and . Cyber Defense and Situational Awareness, volume 62 of Advances in Information Security, Springer, (2014)Dynamic Creation of Social Networks for Syndromic Surveillance Using Information Fusion., , , and . SBP, volume 6007 of Lecture Notes in Computer Science, page 330-337. Springer, (2010)