Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 18 of 18)
Art Authentication in an Untagged Art Database
Cyber Agility for Attack Deterrence and Deception
Cyber Agility for Attack Deterrence and Deception
Cyber Agility for Attack Deterrence and Deception
Data-driven Analytics for Extracting and Inferring Threat Actions and Attack Patterns from the Unstructured Text of Cyber Threat Intelligence
Data-driven Analytics for Extracting and Inferring Threat Actions and Attack Patterns from the Unstructured Text of Cyber Threat Intelligence
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
Empirical Methods in an Open Domain Question Answering System
Empirical Methods in an Open Domain Question Answering System
Examining Untempered Social Media: Information Mutation on GAB.ai
Examining Untempered Social Media: Information Mutation on GAB.ai
MODELING RISK AND THE EFFECT OF AN INCREASE IN FREEWAY POSTED SPEED LIMIT ON CRASHES IN SPEED-CHANGE LANES
MODELING RISK AND THE EFFECT OF AN INCREASE IN FREEWAY POSTED SPEED LIMIT ON CRASHES IN SPEED-CHANGE LANES
Robust and Reliable Real-time Adaptive Motion Planning
Robust and Reliable Real-time Adaptive Motion Planning
Sentiment Analysis on Verbal Data from Team Discussions As an Indicator of Individual Performance
Sentiment Analysis on Verbal Data from Team Discussions As an Indicator of Individual Performance