PROCEEDINGS VOLUME 9826
SPIE DEFENSE + SECURITY | 17-21 APRIL 2016
Cyber Sensing 2016
IN THIS VOLUME

4 Sessions, 12 Papers, 0 Presentations
Proceedings Volume 9826 is from: Logo
SPIE DEFENSE + SECURITY
17-21 April 2016
Baltimore, Maryland, United States
Front Matter: Volume 9826
Proc. SPIE 9826, Front Matter: Volume 9826, 982601 (2 June 2016); https://doi.org/10.1117/12.2245242
Risks and Mitigations
Proc. SPIE 9826, OS friendly microprocessor architecture: Hardware level computer security, 982602 (12 May 2016); https://doi.org/10.1117/12.2220777
Proc. SPIE 9826, Network reconstruction via graph blending, 982605 (12 May 2016); https://doi.org/10.1117/12.2223864
Proc. SPIE 9826, Identifying compromised systems through correlation of suspicious traffic from malware behavioral analysis, 982606 (12 May 2016); https://doi.org/10.1117/12.2223968
New Concepts for Sensing
Proc. SPIE 9826, Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions, 98260A (12 May 2016); https://doi.org/10.1117/12.2229608
Learning and Social Aspects of Cyber
Proc. SPIE 9826, Hybrid sentiment analysis utilizing multiple indicators to determine temporal shifts of opinion in OSNs, 98260B (12 May 2016); https://doi.org/10.1117/12.2222875
Proc. SPIE 9826, Social relevance: toward understanding the impact of the individual in an information cascade, 98260C (12 May 2016); https://doi.org/10.1117/12.2222888
Proc. SPIE 9826, Application of actor level social characteristic indicator selection for the precursory detection of bullies in online social networks, 98260D (12 May 2016); https://doi.org/10.1117/12.2224351
Proc. SPIE 9826, Self-structuring data learning approach, 98260E (22 June 2016); https://doi.org/10.1117/12.2228739
Proc. SPIE 9826, Visualizing output for a data learning algorithm, 98260F (13 July 2016); https://doi.org/10.1117/12.2228742
Proc. SPIE 9826, Implementing a self-structuring data learning algorithm, 98260G (22 June 2016); https://doi.org/10.1117/12.2228743
Proc. SPIE 9826, Behavior-based network management: a unique model-based approach to implementing cyber superiority, 98260H (17 May 2016); https://doi.org/10.1117/12.2227969
Back to Top