UAV Passive Acoustic Detection (Englisch)
- Neue Suche nach: Sedunov, Alexander
- Neue Suche nach: Salloum, Hady
- Neue Suche nach: Sutin, Alexander
- Neue Suche nach: Sedunov, Nikolay
- Neue Suche nach: Sedunov, Alexander
- Neue Suche nach: Salloum, Hady
- Neue Suche nach: Sutin, Alexander
- Neue Suche nach: Sedunov, Nikolay
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:UAV Passive Acoustic Detection
-
Beteiligte:Sedunov, Alexander ( Autor:in ) / Salloum, Hady ( Autor:in ) / Sutin, Alexander ( Autor:in ) / Sedunov, Nikolay ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.10.2018
-
Format / Umfang:1141319 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Robust Double-Blind Secure High Capacity Watermarking and Information Hiding Scheme For Authentication and Tampering Recovery Via the Wavelet and Arnold TransformsSwapnil, S. / Megherbi, D. B. et al. | 2018
- 1
-
Modeling and Simulation (M&S) and Test and Evaluation (T&E) of Radiation Detectors for CWMD MissionsChiffelle, Richard / Ford, William / Browning, Tyler / Li, Andy / Wrighten, Lyndon et al. | 2018
- 1
-
iGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat DetectionCai, Chencheng / Chen, Rong / Liu, Alexander D. / Roberts, Fred S. / Xie, Minge et al. | 2018
- 1
-
Trust as a Service: Building and Managing Trust in the Internet of ThingsLiu, Ling / Loper, Margaret et al. | 2018
- 1
-
SWATT: Synchronized Wide-area Sensing and Autonomous Target TrackingTeng, Ervin / Ramirez, Ceferino Gabriel / Iannucci, Bob et al. | 2018
- 1
-
Security-oriented DSA for Network Access Control in Cognitive Radio NetworksLi, Lei / Chigan, Chunxiao / Yuan, Shuai et al. | 2018
- 1
-
Responder Priorities for Technology AdvancementRoyal, Michelle et al. | 2018
- 1
-
Global Shared Resilience: Using 21st Century Technology for Today’s DisastersOrDell, Peter L. et al. | 2018
- 1
-
Network Phenotyping for Network Traffic Classification and Anomaly DetectionZou, Minhui / Wang, Chengliang / Li, Fangyu / Song, WenZhan et al. | 2018
- 1
-
Outreach to Define a Public Safety Communications Model For Broadband Cellular VideoWeinert, Andrew / Budny, Chris et al. | 2018
- 1
-
Threat Analysis of the Security Credential Management System for Vehicular CommunicationsFurtado, Matthew D. / Mushrall, Robert D. / Liu, Hong et al. | 2018
- 1
-
Digital Witness: Remote Method for Volunteering Digital Evidence on Mobile DevicesCampbell, Nigel / Goodyear, Trevor / Messer, Winston / Stuart, Evan / Fairbanks, James et al. | 2018
- 1
-
Human Detection in Infrared Imagery using Gradient and Texture Features and Super-pixel SegmentationRagb, Hussin K. / Aspiras, Theus H. / Asari, Vijayan K. et al. | 2018
- 1
-
Extended Intruder Detection to Counter Advanced Underwater Threats in Ports and HarborsFelber, Franklin et al. | 2018
- 1
-
U-WaVe: Unmanned Water Vehicle for Costal Surveillance and Search and Rescue : Undergraduate Research ExperienceRosario, Larissa Del / Ramirez, Jomar J / Romero, Luis / Ortiz, Kevin / Ocasio, Angel / Rivera, Eduardo I. Ortiz et al. | 2018
- 1
-
Applying Machine Learning in Managing Deployable SystemsNygate, Joseph / Hochgraf, Clark / Indelicato, Mark / Johnson, William / Bazdresch, Miguel / Reyes, Romel Espinosa et al. | 2018
- 1
-
NIDS: Neural Network based Intrusion Detection SystemAl-Maksousy, Hassan Hadi / Weigle, Michele C. / Wang, Cong et al. | 2018
- 1
-
Operational Tradeoffs in the 2018 Department of Homeland Security Science and Technology Directorate Biometric Technology RallyHasselgren, Jacob A. / Howard, John J. / Sirotin, Yevgeniy B. / Blanchard, Andrew J. / Vemury, Arun et al. | 2018
- 1
-
Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering NetworksBahulkar, Ashwin / Baycik, N. Orkun / Sharkey, Thomas / Shen, Yeming / Szymanski, Boleslaw / Wallace, William et al. | 2018
- 1
-
UAV Passive Acoustic DetectionSedunov, Alexander / Salloum, Hady / Sutin, Alexander / Sedunov, Nikolay et al. | 2018
- 1
-
Automatic Frame-Cut Detection for Self-Diagnostics of Video Surveillance SystemsSamani, Arash / Panetta, Karen / Wan, Qianwen / Agaian, Sos et al. | 2018
- 1
-
On the Feasibility of Generating Deception Environments for Industrial Control SystemsUrias, Vincent E. / William Stout, M.S. / Leeuwen, Brian Van et al. | 2018
- 1
-
Providing first responders with real-time status of cellular networks during a disasterHochgraf, Clark / Nygate, Joseph / Bazdresch, Miguel / Indelicato, Mark / Johnson, William P. / Reyes, Romel Espinosa et al. | 2018
- 1
-
OcularNet: Deep Patch-based Ocular Biometric RecognitionReddy, Narsi / Rattani, Ajita / Derakhshani, Reza et al. | 2018
- 1
-
Binding the Physical and Cyber Worlds: A Blockchain Approach for Cargo Supply Chain Security EnhancementXu, Lei / Chen, Lin / Gao, Zhimin / Chang, Yanling / Iakovou, Eleftherios / Shi, Weidong et al. | 2018
- 1
-
Towards Automated Post-Disaster Damage Assessment of Critical Infrastructure with Small Unmanned Aircraft SystemsMao, Zhong / Yan, Yujie / Wu, Jiahao / Hajjar, Jerome F. / Padlr, Taskin et al. | 2018
- 1
-
A Systems Approach to Indicators of Compromise Utilizing Graph Theory| 2018
- 1
-
Cracking a Continuous Flow Reactor: A Vulnerability Assessment for Chemical Additive Manufacturing DevicesKosturko, Joseph / Schlieber, Eric / Futch, Sean / Nielson, Seth et al. | 2018
- 1
-
Application of a Defender-Attacker-Defender Model to the U.S. Air Transportation NetworkThompson, Karl H. / Tran, Huy T. et al. | 2018
- 1
-
Sighted Cable Cut SameJackson, B. Clay / David, Michael W. / Simmons, Mitchell E. et al. | 2018
- 1
-
Establishing Independent Audit Mechanisms for Database Management SystemsRasin, Alexander / Wagner, James / Heart, Karen / Grier, Jonathan et al. | 2018
- 1
-
Visualization and Communication Tool for Emergency ResponseGelernter, J. / Maheshwari, N. / Sussman, A. et al. | 2018
- 1
-
User Re-Identification Using Clothing Information for SmartphonesNguyen, Mark Hoang / Puttagunta, Raghunath / Li, Zhu / Derakhshani, Reza et al. | 2018
- 1
-
Cyber Handyman and Nursing for Humanitarian Services and Disaster ReliefJonnada, Srikanth / Dantu, Ram / Ranasinghe, Ishan et al. | 2018
- 1
-
Estimating the Location of a Nuclear Source in a Three-Dimensional Environment Exhibiting Non-Homogeneous AttenuationBhattacharyya, Upasana / Baum, Carl W et al. | 2018
- 1
-
Machine Learning for Efficient Assessment and Prediction of Human Performance in Collaborative Learning EnvironmentsChopade, Pravin / Khan, Saad M / Edwards, David / von Davier, Alina et al. | 2018
- 1
-
Blockchain-enhanced Identities for Secure InteractionChakravarty, Dipto / Deshpande, Tushar et al. | 2018
- 1
-
Robustness-to-Noise Analysis of A Secure High Capacity Full-gray-scale-Image Information Hiding Via A New DCT-Moments-Based SchemeHabbouli, O. / Megherbi, D. B. et al. | 2018
- 1
-
Exploiting Spatial Signatures of Power ENF Signal for Measurement Source AuthenticationCui, Yi / Liu, Yilu / Fuhr, Peter / Morales-Rodriguez, Marissa et al. | 2018
- 1
-
Case Study: Challenges in Homeland Security Operations in Argentina and Role of Emerging TechnologiesRawat, Pramud et al. | 2018
- 1
-
University and Government Uniting to Address Homeland CyberSecurity IssuesMcQuaid, Patricia / Britton, Bill / Minnich, Martin / Borelli, Danielle / Baker, Jimmy / Burton, Bruce et al. | 2018
- 1
-
Fair Authentic Acoustic Network GroupingLowney, M. Phil / Liu, Hong / Chabot, Eugene et al. | 2018
- 1
-
Building robust risk management as a method of situational awareness at the local levelSchneider, Jennifer / Romanowski, Carol / Mishra, Sumita / Raj, Rajendra K. / Dobie, Sarah et al. | 2018
- 1
-
Aerial Border Surveillance for Search and Rescue Missions Using Eye Tracking TechniquesWan, Qianwen / Kaszowska, Aleksandra / Samani, Arash / Panetta, Karen / Taylor, Holly A. / Agaian, Sos et al. | 2018
- 1
-
Development of Dual Energy Container Inspection System for Harbor Security in KAERILee, Byeong-No / Chae, Moonsik / Oh, Kyungmin / Cha, Hyungki et al. | 2018
- 1
-
Keystroke Dynamics Based Authentication Using GFMBhatia, Aparna / Hanmandlu, Madasu / Vasikarla, Shantaram / Panigrahi, B. K. et al. | 2018
- 1
-
Extracting Dialed Telephone Numbers from Unstructured AudioPresser, Steven / Walsh, Michael et al. | 2018
- 1
-
Learnings of the Complete Power Grid Destruction in Puerto Rico by Hurricane MariaLopez-Cardalda, Guillermo / Lugo-Alvarez, Melvin / Mendez-Santacruz, Sergio / Rivera, Eduardo Ortiz / Bezares, Erick Aponte et al. | 2018
- 1
-
Static Object Wi-Fi Imaging and ClassifierProffitt, Paul C. / Wang, Honggang et al. | 2018
- 1
-
Data-Driven Multi-Agent Email GeneratorsStayton, Erik / Roque, Antonio et al. | 2018
- 1
-
Evaluation of Datacasting and Lte Integration for Public Safety and First Responder ApplicationsLuu, Cuong / Syed, Daniel / Gaither, Morgan / Contestabile, John et al. | 2018
- 1
-
Seismic Cloaking Protection from EarthquakesHaupt, Robert W. / Liberman, Vladimir / Rothschild, Mordechai / Doll, Charles G. et al. | 2018
- 1
-
Long-term testing of acoustic system for tracking low-flying aircraftSedunov, Alexander / Salloum, Hady / Sutin, Alexander / Sedunov, Nikolay et al. | 2018
- 1
-
Three-Dimensional Radiative Transfer for Hyperspectral Imaging Classification and DetectionGolowich, Steven / Lockwood, Ronald / Chrisp, Michael / Manolakis, Dimitris et al. | 2018
- 1
-
Maritime Border Security using Sensors, Processing, and Platforms to Detect Dark VesselsEaton, Ross S. / German, Stan / Balasuriya, Arjuna et al. | 2018
- 1
-
Multiparameter Outstation Agents for Cyber-Physical Electrical Grid Security and RestorationMorales-Rodriguez, Marissa E. / Stewart, Emma / Fuhr, Peter L. et al. | 2018
- 1
-
Forecasting Cyberattacks as Time Series with Different Aggregation GranularityWerner, Gordon / Okutan, Ahmet / Yang, Shanchieh / McConky, Katie et al. | 2018
- 1
-
MEADE: Towards a Malicious Email Attachment Detection EngineRudd, Ethan M. / Harang, Richard / Saxe, Joshua et al. | 2018
- 1
-
Cybertropolis: breaking the paradigm of cyber-ranges and testbedsDeckard, Gary M. et al. | 2018
- 1
-
A Method of Threat Analysis for Cyber-Physical System using Vulnerability DatabasesMishina, Yusuke / Takaragi, Kazuo / Umezawa, Katsuyuki et al. | 2018
- 1
-
Person Re-identification Using Overhead View Fisheye Lens CamerasBarman, Arko / Wu, Wencheng / Loce, Robert P. / Burry, Aaron Michael et al. | 2018
- 1
-
Secure Software by DesignRothschild, Shimon et al. | 2018
- 1
-
Technologies to Support Victims of Sexual AssaultEllis, Christian / Fiondella, Lance et al. | 2018
- 1
-
Cross-referencing social media and public surveillance camera data for disaster responseSurakitbanharn, Chittayong / Yau, Calvin / Wang, Guizhen / Chawla, Aniesh / Pan, Yinuo / Sun, Zhaoya / Yellin, Sam / Ebert, David / Lu, Yung-Hsiang / Thiruvathukal, George K. et al. | 2018
- 1
-
Towards a Content-based Defense against Text DDoS in 9–1-1 Emergency SystemsBal, Bal Krishna / Shi, Weidong Larry / Huang, Shou-Hsuan Stephen / Gnawali, Omprakash et al. | 2018
- 1
-
Analysis of Adversarial Learning of Reactor StateLi, Yeni / Abdel-Khalik, Hany S. / Bertino, Elisa et al. | 2018
- 1
-
The Economics of Critical Infrastructure Controls Systems’ Cyber SecurityLerums, James E. / Dietz, J. Eric et al. | 2018
- 1
-
Rapid Low-Cost Detection of Persons Concealed in Containers, Compartments and TrucksFelber, Franklin et al. | 2018
- 1
-
Performance of National Security and Emergency Preparedness Services During Hazards of National SignificanceMasi, Denise M. / Biagi, Brittany L. / Fekadu, Nassissie / Garbin, David A. / Gordon, Steven P. / Hussain, Muhammad A. / White, David J. / Kaczmarek, Richard / Dew, Robert et al. | 2018
- 1
-
Multi-biometric Convolutional Neural Networks for Mobile User AuthenticationRattani, Ajita / Reddy, Narsi / Derakhshani, Reza et al. | 2018
- 1
-
Can a Student Outperform a Teacher? Deep Learning-based Named Entity Recognition using Automatic Labeling of the Global Terrorism DatabaseKim, Ilhwan / Pottenger, William M. / Behe, Vincent et al. | 2018
- 1
-
Technical Review and Optimization of Walk-Through Metal Detector ProcessesHustedt, Anthony / Craig, Colby et al. | 2018
- 1
-
Aviation Transportation, Cyber Threats, and Network-of-Networks: Modeling Perspectives for Translating Theory to PracticeBhatia, Udit / Chatterjee, Samrat / Ganguly, Auroop Ratan / Gao, Jianxi / Halappanavar, Mahantesh / Oster, Matthew / Clark, Kevin / Brigantic, Robert / Tipireddy, Ramakrishna et al. | 2018
- 1
-
Active Deep Learning Attacks under Strict Rate Limitations for Online API CallsShi, Yi / Sagduyu, Yalin E. / Davaslioglu, Kemal / Li, Jason H. et al. | 2018
- 1
-
Unmanned Aircraft Applications in Radiological SurveysKochersberger, Kevin / Peterson, John / Kumar, Prashant / Bird, John / McLean, Morgan / Czaja, Wojciech / Li, Weilin / Monson, Nathaniel et al. | 2018
- 1
-
Comparisons of Adaptive Automation Conditions for Single-Operator Multiple-Agent Control SystemsPark, Sabin / Endsley, Tristan / Padir, Taskin et al. | 2018
- 1
-
Persistent, Robust, Effective Surveillance using Small Unmanned Aerial Systems (PRESS)Watson, William D. / Couto, David / Sussman-Fort, Jonathan et al. | 2018
- 1
-
Enabling Hardware Trojan Detection and Prevention through EmulationCrouch, Alfred / Hunter, Eve / Levin, Peter L. et al. | 2018
- 1062
-
Use of Computer Simulation Modeling to Reduce the Consequences of an Active Shooter Event in a Large Event VenueGlass, Patrick / Iyer, Swarnalakshmi / Lister-Gruesbeck, Kristina / Schulz, Nathan / Dietz, J. Eric et al. | 2018
- c1
-
[Front cover]| 2018
- i
-
[Copyright notice]| 2018