메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 3943-3948

An advanced system for modeling asymmetric threats

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; MARKOV PROCESSES; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 34548142205     PISSN: 1062922X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSMC.2006.384748     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 2
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol 77, no. 2, pp 257-286, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 4
    • 15744378078 scopus 로고    scopus 로고
    • Stochastic Modeling of a Terrorist Event via the ASAM system
    • Man and Cybernetics, Hague, Netherlands, October
    • S. Singh, J. Allanach, H. Tu, K. Pattipati and P. Willett, "Stochastic Modeling of a Terrorist Event via the ASAM system," IEEE Conference on Systems, Man and Cybernetics, Hague, Netherlands, October 2004.
    • (2004) IEEE Conference on Systems
    • Singh, S.1    Allanach, J.2    Tu, H.3    Pattipati, K.4    Willett, P.5
  • 6
    • 33847738441 scopus 로고    scopus 로고
    • QSI website, http://www.teamqsi.com.
    • QSI website
  • 11
    • 34548112698 scopus 로고    scopus 로고
    • U.S. Congress, Office of Technology Assessment, Technologies Underlying Weapons of Mass Destruction, OTA-BP-ISC-115, Washington, DC, U.S. Printing Office, December 1993.
    • U.S. Congress, Office of Technology Assessment, "Technologies Underlying Weapons of Mass Destruction," OTA-BP-ISC-115, Washington, DC, U.S. Printing Office, December 1993.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.