


default search action
2. BLISS 2008: Edingburgh, Scotland, UK
- Adrian Stoica, Tughrul Arslan, Daniel Howard, Tetsuya Higuchi, Ahmed O. El-Rayis:

2008 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2008, Edinburgh, UK, 4-6 August 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3265-3 - Charlie D. Frowd, Joanne Park, Alex H. McIntyre, Vicki Bruce, Melanie Pitchford, Steve Fields, Mary Kenirons, Peter J. B. Hancock

:
Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable Face. 3-10 - S. Chague, B. Droit, Oleg Boulanov, Svetlana N. Yanushkevich

, Vlad P. Shmerko, Adrian Stoica
:
Biometric-Based Decision Support Assistance in Physical Access Control Systems. 11-16 - Sanaul Hoque

, Michael C. Fairhurst, W. Gareth J. Howells:
Evaluating Biometric Encryption Key Generation Using Handwritten Signatures. 17-22 - Nobuyuki Otsu:

CHLAC Approach to Flexible and Intelligent Vision Systems. 23-33 - Kenji Iwata

, Yutaka Satoh
, Katsuhiko Sakaue, Takumi Kobayashi
, Nobuyuki Otsu:
Development of Software for Real-Time Unusual Motions Detection by Using CHLAC. 34-39 - Takumi Kobayashi

, Tadaaki Hosaka, Shu Mimura, Takashi Hayashi, Nobuyuki Otsu:
HLAC Approach to Automatic Object Counting. 40-45 - Akinori Hidaka, Takio Kurita

, Nobuyuki Otsu:
Object Detection by Selective Integration of HLAC Mask Features. 46-50 - Kenji Watanabe

, Takio Kurita
:
Motion Recognition by Higher Order Local Auto Correlation Features of Motion History Images. 51-55 - Shu Mimura, Keichi Itoh, Takumi Kobayashi

, Tomohiro Takigawa, Atsushi Tajima
, Atsushi Sawamura, Nobuyuki Otsu:
The Cow Gait Recognition Using CHLAC. 56-57 - D. Paul Benjamin, Partha P. Pal

, Franklin Webber, Paul Rubel, Mike Atigetchi:
Using a Cognitive Architecture to Automate Cyberdefense Reasoning. 58-63 - Zhongxue Yang, Adem Karahoca

, Ning Yang, Nizamettin Aydin
:
Network Intrusion Detection by Using Cellular Neural Network with Tabu Search. 64-68 - Karl Harmer, Weiguo Sheng, W. Gareth J. Howells, Michael C. Fairhurst, Farzin Deravi

:
Fuzzy Vault Fingerprint Smartcard Implementation Using an Orientation-Based Feature Vector. 69-74 - Asier Goikoetxea Yanci, Stephen Pickles, Tughrul Arslan:

Detecting Voltage Glitch Attacks on Secure Devices. 75-80 - Andrew B. T. Hopkins, Pieter Sartain, Klaus D. McDonald-Maier

, W. Gareth J. Howells:
Towards Embedded Artificial Intelligence Based Security for Computer Systems. 81-86 - Evangelos Papoutsis, W. Gareth J. Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier

:
Effects of Feature Trimming on Encryption Key Stability for an ICmetric System. 87-91 - Philip Christopher Paul, Simon W. Moore

, Simon W.-B. Tam:
Tamper Protection for Security Devices. 92-96 - H. J. Kadim:

Analytical Modelling: An Investigation into the Use of Smart Biosensors as Stealth Countermeasures. 97-100 - Adrian Udenze, Klaus D. McDonald-Maier

:
Partially Observable Markov Decision Process for Transmitter Power Control in Wireless Sensor Networks. 101-106 - Isabella Panella:

High-Level Functional Architecture for Sensor Management System. 107-110 - Isabella Panella:

Artificial Intelligence Methodologies Applicable to Support the Decision-Making Capability on Board Unmanned Aerial Vehicles. 111-118 - Tanya Vladimirova, Kawsu Sidibeh:

WLAN for Earth Observation Satellite Formations in LEO. 119-124 - Adrian Stoica

:
Towards Recognition of Humans and their Behaviors from Space and Airborne Platforms: Extracting the Information in the Dynamics of Human Shadows. 125-128 - Joseph Kolibal, Daniel Howard:

Stochastic Interpolation: A Probabilistic View. 129-135 - Gareth Howells, Hossam Selim, Michael C. Fairhurst, Farzin Deravi

, Sanaul Hoque
:
A Securable Autonomous Generalised Document Model (SAGENT). 136-141 - Yun Shen, Trevor P. Martin:

Granular Association Analysis. 142-147 - Wael Adi:

Clone-Resistant DNA-Like Secured Dynamic Identity. 148-153 - Andrew Burnside, Ahmet T. Erdogan

, Tughrul Arslan:
The Re-emission Side Channel. 154-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














