-
1
-
-
10644280105
-
Intelligence and security informatics for homeland security: Information, communication, and transportation
-
Dec
-
H. Chen, F.-Y. Wang, and D. Zeng, "Intelligence and security informatics for homeland security: Information, communication, and transportation," IEEE Trans. Intell. Transp. Syst., vol. 5, no. 4, pp. 329-341, Dec. 2004.
-
(2004)
IEEE Trans. Intell. Transp. Syst
, vol.5
, Issue.4
, pp. 329-341
-
-
Chen, H.1
Wang, F.-Y.2
Zeng, D.3
-
2
-
-
12144262433
-
Naturally occurring radioactive materials and medical isotopes at border crossings
-
R. T. Kouzes, J. H. Ely, B. D. Geelhood, R. R. Hansen, E. A. Lepel, J. E. Schweppe, E. R. Siciliano, D. J. Strom, and R. A. Warner, "Naturally occurring radioactive materials and medical isotopes at border crossings," in IEEE Nucl. Sci. Symp. Conf. Rec., 2003, vol. 2, pp. 1448-1452.
-
(2003)
IEEE Nucl. Sci. Symp. Conf. Rec
, vol.2
, pp. 1448-1452
-
-
Kouzes, R.T.1
Ely, J.H.2
Geelhood, B.D.3
Hansen, R.R.4
Lepel, E.A.5
Schweppe, J.E.6
Siciliano, E.R.7
Strom, D.J.8
Warner, R.A.9
-
3
-
-
4444346507
-
Discrimination of naturally occurring radioactive material in plastic scintillator materials
-
Aug
-
J. H. Ely, R. T. Kouzes, B. D. Geelhood, J. E. Schweppe, and R. A. Warner, "Discrimination of naturally occurring radioactive material in plastic scintillator materials," IEEE Trans. Nucl. Sci., vol. 51, no. 4, pp. 1672-1676, Aug. 2004.
-
(2004)
IEEE Trans. Nucl. Sci
, vol.51
, Issue.4
, pp. 1672-1676
-
-
Ely, J.H.1
Kouzes, R.T.2
Geelhood, B.D.3
Schweppe, J.E.4
Warner, R.A.5
-
4
-
-
4344592284
-
Radiation detection with distributed sensor networks
-
Aug
-
S. M. Brennan, A. M. Mielke, D. C. Torney, and A. B. Maccabe, "Radiation detection with distributed sensor networks," Comput., vol. 37, no. 8, pp. 57-59, Aug. 2004.
-
(2004)
Comput
, vol.37
, Issue.8
, pp. 57-59
-
-
Brennan, S.M.1
Mielke, A.M.2
Torney, D.C.3
Maccabe, A.B.4
-
5
-
-
23844468487
-
Radioactive source detection by sensor networks
-
Jun
-
S. M. Brennan, A. M. Mielke, and D. C. Torney, "Radioactive source detection by sensor networks," IEEE Trans. Nucl. Sci., vol. 52, no. 3, pp. 813-819, Jun. 2005.
-
(2005)
IEEE Trans. Nucl. Sci
, vol.52
, Issue.3
, pp. 813-819
-
-
Brennan, S.M.1
Mielke, A.M.2
Torney, D.C.3
-
6
-
-
11844286406
-
Overview of portal monitoring at border crossings
-
B. D. Geelhood, J. H. Ely, R. R. Hansen, R. T. Kouzes, J. E. Schweppe, and R. A. Warner, "Overview of portal monitoring at border crossings," in IEEE Nucl. Sci. Symp. Conf. Rec., 2003, vol. 2, pp. 513-517.
-
(2003)
IEEE Nucl. Sci. Symp. Conf. Rec
, vol.2
, pp. 513-517
-
-
Geelhood, B.D.1
Ely, J.H.2
Hansen, R.R.3
Kouzes, R.T.4
Schweppe, J.E.5
Warner, R.A.6
-
7
-
-
33847234651
-
Overview of nuclear detection needs for homeland security
-
Vancouver, BC, Canada, Sep. 10-14
-
T. E. Valentine, "Overview of nuclear detection needs for homeland security," in Proc. Conf. Amer. Nucl. Soc., PHYSOR, Vancouver, BC, Canada, Sep. 10-14, 2006.
-
(2006)
Proc. Conf. Amer. Nucl. Soc., PHYSOR
-
-
Valentine, T.E.1
-
10
-
-
5444236478
-
The empirical mode decomposition method and the Hilbert spectrum for non-stationary time series analysis
-
N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, S. H. Shih, Q. Zheng, C.C. Tung, and H. H. Liu, "The empirical mode decomposition method and the Hilbert spectrum for non-stationary time series analysis," Proc. R. Soc. Lond. A, Math. Phys. Sci., vol. 454, pp. 903-995, 1998.
-
(1998)
Proc. R. Soc. Lond. A, Math. Phys. Sci
, vol.454
, pp. 903-995
-
-
Huang, N.E.1
Shen, Z.2
Long, S.R.3
Wu, M.C.4
Shih, S.H.5
Zheng, Q.6
Tung, C.C.7
Liu, H.H.8
-
11
-
-
0042553279
-
Smoothing and differentiation of data by simplified least squares procedures
-
Jul
-
A. Savitzky and M. J. E. Golay, "Smoothing and differentiation of data by simplified least squares procedures," Anal. Chem., vol. 36, no. 8, pp. 1627-1639, Jul. 1964.
-
(1964)
Anal. Chem
, vol.36
, Issue.8
, pp. 1627-1639
-
-
Savitzky, A.1
Golay, M.J.E.2
-
13
-
-
0035680331
-
Anomaly detection in communication networks using wavelets
-
Dec
-
V. Alarcon-Aquino and J. A. Barria, "Anomaly detection in communication networks using wavelets," Proc. Inst. Elect. Eng. - Commun., vol. 148, no. 6, pp. 355-362, Dec. 2001.
-
(2001)
Proc. Inst. Elect. Eng. - Commun
, vol.148
, Issue.6
, pp. 355-362
-
-
Alarcon-Aquino, V.1
Barria, J.A.2
-
14
-
-
0029527609
-
Climate signal detection using wavelet transform: How to make time series sing
-
Dec
-
K.-M. Lau and H. Weng, "Climate signal detection using wavelet transform: How to make time series sing," Bull. Amer. Meteorol. Soc., vol. 76, no. 12, pp. 2391-2402, Dec. 1995.
-
(1995)
Bull. Amer. Meteorol. Soc
, vol.76
, Issue.12
, pp. 2391-2402
-
-
Lau, K.-M.1
Weng, H.2
-
15
-
-
17444397467
-
DDoS attack detection and wavelets
-
Mar
-
L. Li and G. Lee, "DDoS attack detection and wavelets," Telecommun. Syst., vol. 28, no. 3/4, pp. 435-451, Mar. 2005.
-
(2005)
Telecommun. Syst
, vol.28
, Issue.3-4
, pp. 435-451
-
-
Li, L.1
Lee, G.2
-
16
-
-
0024700097
-
A theory for multiresolution signal decomposition: The wavelet representation
-
Jul
-
S. G. Mallat, "A theory for multiresolution signal decomposition: The wavelet representation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 7, pp. 674-693, Jul. 1989.
-
(1989)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.11
, Issue.7
, pp. 674-693
-
-
Mallat, S.G.1
-
18
-
-
1542757117
-
Can continuous streamflow data support flood frequency analysis? An alternative to the partial duration series approach
-
Aug
-
P. Claps and F. Laio, "Can continuous streamflow data support flood frequency analysis? An alternative to the partial duration series approach," Water Resour. Res., vol. 39, no. 8, pp. 1216-1226, Aug. 2003.
-
(2003)
Water Resour. Res
, vol.39
, Issue.8
, pp. 1216-1226
-
-
Claps, P.1
Laio, F.2
-
19
-
-
0033530888
-
Towards operational guidelines for over-threshold modeling
-
Dec
-
M. Lang, T. B. M. J. Ouarda, and B. Bobée, "Towards operational guidelines for over-threshold modeling," J. Hydrol., vol. 225, no. 3/4, pp. 103-117, Dec. 1999.
-
(1999)
J. Hydrol
, vol.225
, Issue.3-4
, pp. 103-117
-
-
Lang, M.1
Ouarda, T.B.M.J.2
Bobée, B.3
-
20
-
-
12244295960
-
On goodness of fit of time series models: An application of higher order crossings
-
Aug
-
B. Kedem and E. Slud, "On goodness of fit of time series models: An application of higher order crossings," Biometrika, vol. 68, no. 2, pp. 551-556, Aug. 1981.
-
(1981)
Biometrika
, vol.68
, Issue.2
, pp. 551-556
-
-
Kedem, B.1
Slud, E.2
-
21
-
-
33745108812
-
A bit level representation for time series data mining with shape based similarity
-
Jul
-
A. Bagnall, C. Ratanamahatana, E. Keogh, S. Lonardi, and G. Janacek, "A bit level representation for time series data mining with shape based similarity," Data Mining Knowl. Discovery, vol. 13, no. 1, pp. 11-40, Jul. 2006.
-
(2006)
Data Mining Knowl. Discovery
, vol.13
, Issue.1
, pp. 11-40
-
-
Bagnall, A.1
Ratanamahatana, C.2
Keogh, E.3
Lonardi, S.4
Janacek, G.5
-
22
-
-
34250727441
-
Three myths about dynamic time warping
-
Newport Beach, CA
-
C. A. Ratanamahatana and E. Keogh, "Three myths about dynamic time warping," in Proc. SIAM Int. Conf. Data Mining, Newport Beach, CA, 2005, pp. 506-510.
-
(2005)
Proc. SIAM Int. Conf. Data Mining
, pp. 506-510
-
-
Ratanamahatana, C.A.1
Keogh, E.2
-
23
-
-
20444501420
-
Learning rules and clusters for anomaly detection in network traffic
-
V. Kumar, J. Srivastava, and A. Lazarevic, Eds. New York: Springer-Verlag
-
P. K. Chan, M. V. Mahoney, and M. H. Arshad, "Learning rules and clusters for anomaly detection in network traffic," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. New York: Springer-Verlag, 2005, pp. 81-99.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
, pp. 81-99
-
-
Chan, P.K.1
Mahoney, M.V.2
Arshad, M.H.3
-
24
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D.Barbara and S. Jajodia, Eds. New York: Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Applications of Data Mining in Computer Security, D.Barbara and S. Jajodia, Eds. New York: Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
|