Search

Your search keyword '"Computer Science (CS)"' showing total 3,029 results

Search Constraints

Start Over You searched for: Author "Computer Science (CS)" Remove constraint Author: "Computer Science (CS)"
3,029 results on '"Computer Science (CS)"'

Search Results

1. ANALYSIS OF CLIENT-SIDE ATTACKS THROUGH DRIVE-BY HONEYPOTS

2. VISUAL MODELING AND SIMULATION OF CRYPTOGRAPHIC PROTOCOLS UNDER CONTESTED ENVIRONMENTS

3. IDENTIFICATION AND ANALYSIS OF ATTACKS USING RECOVERED RADIO NETWORK TEMPORARY IDENTIFIERS ON 5G USER EQUIPMENT

4. INTERPRETABILITY FOR ARTIFICIAL INTELLIGENCE IN SPEAKER RECOGNITION TASKS

5. LAYING THE GROUNDWORK: FITNESS TRACKER SECURITY FOR USE BY DEPARTMENT OF THE NAVY PERSONNEL

6. BEHAVIORAL COMPOSITION FOR HETEROGENEOUS SWARMS

7. FORMING ADVERSARIAL EXAMPLE ATTACKS AGAINST DEEP NEURAL NETWORKS WITH REINFORCEMENT LEARNING

8. REMOVING THE MASK: VIDEO FINGERPRINTING ATTACKS OVER TOR

9. TOWARD AUTOMATED THREAT MODELING BY ADVERSARY NETWORK INFRASTRUCTURE DISCOVERY

10. EXPLORING NEURAL NETWORK DEFENSES WITH ADVERSARIAL MIXUP

11. ON EUCLIDEAN NETWORKS FOR IMPROVING CLASSIFICATION ACCURACY

12. ANOMALY DETECTION ON FLOWS AND INCOMING PACKETS WITH GAUSSIAN MIXTURES

13. FEDERATED LEARNING OF BAYESIAN NEURAL NETWORKS

14. INCREASING UTILITY AND FIDELITY OF A UXV NETWORKED CONTROL SYSTEM SIMULATION VIA PYTHON ADAPTATION

15. Update on Machine-Learned Correctness Properties

16. THE ROLE OF DECEPTIVE DEFENSE IN CYBER STRATEGY

17. DETECTING AND DEFENDING AGAINST DIFFERENT FAMILIES OF ADVERSARIAL EXAMPLE ATTACKS

18. Optimizing Naval Movement Using Deep Reinforcement Learning

19. GAUSSIAN PROCESSES FOR SATELLITE DATA

20. ZERO TRUST ARCHITECTURE IMPLEMENTATION FOR THE MARINE CORPS TACTICAL CLOUD

21. CLASSIFYING TCP NETWORK TRAFFIC FLOWS VIA TRAFFIC INTERACTION GRAPHS AND MACHINE LEARNING

22. A COMPUTER-BASED SIMULATION TO ACCELERATE MILITARY DECISION-MAKING USING A PLATOON TACTICAL DECISION GAME (TDG)

23. DEVELOPING AN EXPANDABLE GUI TOOL TO ENHANCE NETWORKING EDUCATION: GRAPHICAL USER INTERFACE FOR SHELL ENTRY (GUISE)

24. EMULATING PASSIVE MICROWAVE OBSERVATIONS WITH PATCH-TO-PIXEL CONVOLUTIONAL NEURAL NETWORKS

25. UTILIZING THE MESSAGING LAYER SECURITY PROTOCOL IN A LOSSY COMMUNICATIONS AERIAL SWARM

26. IMPACT OF STOCHASTIC DEPTH ON DETERMINISTIC AND PROBABILISTIC RESNET MODELS FOR WEATHER MODELING

27. SOFTWARE DEFINED NETWORKS: DIALECTING SECURITY

28. MODELING AND SIMULATIONS FOR OPTIMIZATION OF MICROFLUIDIC MICROCAPACITOR ARRAYS OF BIOMIMETIC ARTIFICIAL MUSCLES FOR QUIET PROPULSION AND EXOSKELETAL LOCOMOTION

29. EXPLORING THE ABILITY TO EMPLOY VIRTUAL 3D ENTITIES OUTDOORS AT RANGES BEYOND 20 METERS

30. AN AUTOMATED POST-EXPLOITATION MODEL FOR OFFENSIVE CYBERSPACE OPERATIONS

31. TACHISTOSCOPE ON A VIRTUAL REALITY PLATFORM TO IMPROVE MEMORIZATION AND INCREASE RAPID RECOGNITION

32. X-RAY VISION: APPLICATION OF AUGMENTED REALITY IN AVIATION MAINTENANCE TO SIMPLIFY TASKS INHIBITED BY OCCLUSION

33. ATTACKING NEURAL NETWORKS WITH HIGH ENTROPY INPUT SAMPLING

34. EXPLOITING KASPAROV'S LAW: ENHANCED INFORMATION SYSTEMS INTEGRATION IN DOD SIMULATION-BASED TRAINING ENVIRONMENTS

35. IPV6 BLOCKCHAIN DATA COMMUNICATION FOR UAV SWARM-INTELLIGENCE SYSTEMS BASED ON PEER-TO-PEER, PEER-TO-MANY, AND MANY-TO-PEER SCENARIOS

36. DECISION MODEL IMPLEMENTATION IN THE GLOBAL INFORMATION NETWORK ARCHITECTURE

37. SOFTWARE DEFINED CUSTOMIZATION OF NETWORK PROTOCOLS WITH LAYER 4.5

38. MULTI-DIMENSIONAL PROFILING OF CYBER THREATS FOR LARGE-SCALE NETWORKS

39. ENLISTING AI IN COURSE OF ACTION ANALYSIS AS APPLIED TO NAVAL FREEDOM OF NAVIGATION OPERATIONS

40. BEHAVIORAL CHARACTERIZATION OF ATTACKS ON THE REMOTE DESKTOP PROTOCOL

41. APPLYING NATURAL LANGUAGE PROCESSING (NLP) TO ASSESS HEALTH OF MARINE CORPS CULTURE

42. CREATING SYNTHETIC ATTACKS WITH EVOLUTIONARY ALGORITHMS FOR INDUSTRIAL-CONTROL-SYSTEM SECURITY TESTING

43. SUPPORTING MISSION PLANNING WITH A PERSISTENT AUGMENTED ENVIRONMENT

44. APPLYING MACHINE LEARNING FOR COP/CTP DATA FILTERING

45. PREDICTIVE MAINTENANCE USING MACHINE LEARNING AND EXISTING DATA SOURCES

46. ANALYZING HUMAN-INDUCED PATHOLOGY IN THE TRAINING OF REINFORCEMENT LEARNING ALGORITHMS

47. RISK WEIGHTED VULNERABILITY ANALYSIS IN AUTOMATED RED TEAMING

48. A SECURITY-CENTRIC APPLICATION OF PRECISION TIME PROTOCOL WITHIN ICS/SCADA SYSTEMS

49. UNDERWATER COMMUNICATIONS WITH ACOUSTIC STEGANOGRAPHY: RECOVERY ANALYSIS AND MODELING

50. MACHINE LEARNING OPERATIONS (MLOPS) ARCHITECTURE CONSIDERATIONS FOR DEEP LEARNING WITH A PASSIVE ACOUSTIC VECTOR SENSOR

Catalog

Books, media, physical & digital resources