Found 52 results
Filters: author is Harp [Clear All Filters]
2010
"AIMFIRST: Planning for Mission Assurance", 5th International Conference on Information Warefare and Security, Wright-Patterson Air Force Base, Air Force Institute of Technology, Wright-Patterson Air Force Base, 04/08/2010. Abstract
2009
"Model-based Intrusion Assessment in Common Lisp", International Lisp Conference, 2009, Cambridge, MA., Association of Lisp Users and ACM SIGPLAN, 03/22/2009. Abstract
"Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences (HICSS-42), Honolulu, HI, 01/05/2009.
"An Architecture for Scalable Network Defense", The 34th IEEE Conference on Local Computer Networks (LCN 2009), Zürich, Switzerland, 2009 .
2008
Skeptical System, : Honeywell International, Inc., 09/2008.
"Improving Self Defense by Learning from Limited Experience", Cyber Security and Information Intelligence Research Workshop, vol. 4, Oak Ridge National Laboratory, ACM Press, 05/12/2008. Abstract
"Trapping Malicious Insiders in the SPDR Web", Hawaii International Conference on Systems Sciences, 2008 .
2006
"Generating Policies for Defense in Depth (DiD)", IAnewsletter, vol. 9, issue 3, 11/2006. Abstract
2005
"Generating Policies for Defense in Depth", 21st Annual Computer Security Applications Conference, 12/2005.
"Course of Action Generation for Cyber Security Using Classical Planning", ICAPS-05, 06/05/2005. Abstract
2004
"Empirical analysis of a probabilistic task tracking algorithm. Workshop on Agent Tracking", Workshop on Agent Tracking, Autonomous Agents and MultiAgent Systems (AAMAS), New York, NY, 07/20/2004. Abstract
Content-Based Retrieval of Series Data, : Honeywell International, Inc., 06/2004. Abstract
"CLOCKWORK: Requirements Definition and Technology Evaluation for Robust, Compiled Autonomous Spacecraft Executives", NASA Grant NAG-2-1624: NASA, 01/2004.
2003
System and Method for Learning Patterns of Behavior and Operating a Monitoring and Response System Based Thereon, : Honeywell International, Inc, 12/2003. Abstract
Automated Configuration of Security Software Suites, , 03/2003. Abstract
Moving Object Assessment System and Method, : Honeywell International, Inc., 03/2003. Abstract
"Principles of Skeptical Systems", Human Interaction with Autonomous Systems in Complex Environments, 2003 Spring Symposium on Artificial Intelligence, Palo Alto, CA, 03/2003.
2002
"Application of Clustering Techniques to Energy Data to Enhance Analysts' Productivity", ACEEE 2002 Summer Study on Energy Efficiency in Buildings, Asilomar, CA, 06/2002.
2001
"DETER: Detection of Events for Threat Evaluation and Recognition", IEEE Proceedings, pp. 1478-1497, 10/2001. Abstract
"Modeling for Intrusion Report Aggregation", DARPA Information Survivability Conference and Exposition (DISCEX II '01), 06/12/2001. Abstract
2000
"Sepia: A Simulator for Electric Power Industry Agents", IEEE Control Systems Magazine, 08/2000. Abstract
"Textual Data Mining of Service Center Call Records", KDD'00--Sixth ACM SIGKDD international conference on Knowledge discovery and data mining, Boston, MA, ACM Press, pp. 417--423, 08/20/2000. Abstract
"Adaptive Agents and Artificial Life: Insights for the Power Industry", Soft Computing and Intelligent Systems, San Diego, CA, Academic Press, pp. 571-591, 01/2000.
1999
"Imputation of Missing Data in Industrial Databases", Applied Intelligence, vol. 11, pp. 259-275, 11/12/1999. Abstract
"Collaborative Decision Support for Operations Personnel", INTERKAMMA 99 ISA Technical Conference, 01/2000.
123next ›last »
|