Abstract is missing.
- 2PCA Classification with Ensemble and Multichannel ModelLin Wang 0007, Yongping Li, Chengbo Wang, Hongzhou Zhang. 1-6 [doi]
- Toward Open-Set Text-Independent Speaker Identification in Tactical CommunicationsMatt B. Wolf, WonKyung Park, Jae C. Oh, Misty K. Blowers. 7-14 [doi]
- The PSO-Based Adaptive Window for People TrackingYuhua Zheng, Yan Meng. 23-29 [doi]
- ATR Applications in Military MissionsTed Wong. 30-32 [doi]
- Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary AlgorithmMark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham. 33-41 [doi]
- Computational Verification of System ArchitecturesAbbas K. Zaidi, Alexander H. Levis. 42-49 [doi]
- Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics PlanningBeth DePass. 50-56 [doi]
- Face Recognition System Using Ant Colony Optimization-Based Selected FeaturesHamidreza Rashidy Kanan, Karim Faez, Mehdi Hosseinzadeh. 57-62 [doi]
- Improved Missile Route Planning and Targeting using Game-Based Computational IntelligenceKenneth Doris, David Silvia. 63-68 [doi]
- A Review of Intelligent Systems Software for Autonomous VehiclesLyle N. Long, Scott D. Hanford, Oranuj Janrathitikarn, Greg L. Sinsley, Jodi A. Miller. 69-76 [doi]
- Computational Intelligence Support for Smart Queries and Adaptive DataTrevor Martin, Ben Azvine, Yun Shen. 77-84 [doi]
- A Template-based Method for Force Group Classification in Situation AssessmentHuimin Chai, Baoshu Wang. 85-91 [doi]
- Computationally Derived Models of Adversary OrganizationsSmriti Kansal, Ashraf M. Abusharekh, Alexander H. Levis. 92-99 [doi]
- A Temporal Risk Assessment Framework for Planning A Future Force StructureMichael Barlow, Ang Yang, Hussein A. Abbass. 100-107 [doi]
- Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary ComputationTasha Vanesian, Kenneth Kreutz-Delgado. 108-115 [doi]
- Course of Action Analysis in a Cultural Landscape Using Influence NetsLee W. Wagenhals, Alexander H. Levis. 116-123 [doi]
- Toward Automating Airspace ManagementGlenn Taylor, Brian Stensrud, Susan Eitelman, Cory Dunham, Echo A. Harger. 124-130 [doi]
- Autonomous Visual Self-localization in Completely Unknown Environment using Evolving Fuzzy Rule-based ClassifierXiaowei Zhou, Plamen P. Angelov. 131-138 [doi]
- An Intelligent Controller for Collaborative Unmanned Air VehiclesGregory L. Sinsley, Jodi A. Miller, Lyle N. Long, Brian R. Geiger, Albert F. Niessner, Joseph F. Horn. 139-144 [doi]
- The Automation of Combat Decision Processes in the Simulation Based Operational Training Support SystemAndrzej Najgebauer, Ryszard Antkiewicz, Zbigniew Tarapata, Jaroslaw Rulka, Wojciech Kulas, Dariusz Pierzchala, Roman Wantoch-Rekowski. 145-152 [doi]
- Automatically Evading IDS Using GP Authored AttacksHilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood. 153-160 [doi]
- A Cognitive Approach to Intrusion DetectionDavid P. Benjamin. 161-168 [doi]
- Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data MiningRobert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer, Yuval Shahar, Yuval Elovici. 169-177 [doi]
- Anomaly Detection for Application Level Network Attacks Using Payload KeywordsLike Zhang, Gregory B. White. 178-185 [doi]
- Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector MachineSurat Srinoy. 186-192 [doi]
- Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust VectorsMichael Stevens, Paul D. Williams. 193-200 [doi]
- Architectural Design and Complexity Analysis of Large-Scale Cortical Simulation on a Hybrid Computing PlatformQing Wu, Qinru Qiu, Richard W. Linderman, Daniel J. Burns, Michael J. Moore, Dennis Fitzgerald. 201-205 [doi]
- Towards an Information Asset-Based Defensive Cyber Damage Assessment ProcessMichael R. Grimaila, Larry Fortson. 206-212 [doi]
- A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi NetworksAdetokunbo Makanju, Patrick LaRoche, A. Nur Zincir-Heywood. 213-219 [doi]