Search

Your search keyword '"Travis Atkison"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Travis Atkison" Remove constraint Author: "Travis Atkison" Topic computer science Remove constraint Topic: computer science
37 results on '"Travis Atkison"'

Search Results

1. Characterizing co-modality in urban transit systems from a passengers’ perspective

2. Classification on grade, price, and region with multi-label and multi-target methods in wineinformatics

3. Trajectory-Based Signal Control in Mixed Connected Vehicle Environments

4. Wineinformatics: Using the Full Power of the Computational Wine Wheel to Understand 21st Century Bordeaux Wines from the Reviews

5. An Evolutionary Approach of Attack Graph to Attack Tree Conversion

6. 802.11ac and p in a Simulated VANET Environment

7. VANET applications: Past, present, and future

8. Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters

9. Industrial Control System Network Intrusion Detection by Telemetry Analysis

10. Preliminary research on thesaurus-based query expansion for Twitter data extraction

11. Testing vulnerabilities in bluetooth low energy

12. Causes, impacts, and detection approaches of code smell

13. A Forensic Enabled Data Provenance Model for Public Cloud

14. Granular computing in wineinformatics

15. A Comparison of Features for Android Malware Detection

16. An Experimental Analysis of Windows Log Events Triggered by Malware

17. A Comparison of Fuzzy Hashes

18. Evaluation of Firefox Browser Forensics Tools

19. Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks

20. An Overview of Emerging Privacy Issues in the Internet of Things

21. Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection

22. Web-based secure high performance remote visualization

23. Evaluation of Random Projection for Malware Classification

24. Evolution of digital forensics in virtualization by using virtual machine introspection

25. Applying static analysis to high-dimensional malicious application detection

26. Observing industrial control system attacks launched via metasploit framework

27. On the detection of cyber-events in the grid using PCA

28. Applying random projection to the classification of malicious applications using data mining algorithms

29. Evolution of traditional digital forensics in virtualization

30. Using randomized projection techniques to aid in detecting high-dimensional malicious applications

31. Digital forensics on a virtual machine

32. Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique

34. Pedagogically effective effortless algorithm visualization with a PCIL

35. Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications

36. Web-Based High Performance Remote Visualization

37. Combining lexical and structural information for static bug localisation

Catalog

Books, media, physical & digital resources