关注
Cem Safak Sahin
Cem Safak Sahin
Systems & Technology Research
在 str.us 的电子邮件经过验证
标题
引用次数
引用次数
年份
Automatic association of chats and video tracks for activity learning and recognition in aerial video surveillance
RI Hammoud, CS Sahin, EP Blasch, BJ Rhodes, T Wang
Sensors 14 (10), 19843-19860, 2014
842014
Self-organization of nodes in mobile ad hoc networks using evolutionary games and genetic algorithms
J Kusyk, CS Sahin, MU Uyar, E Urrea, S Gundry
Journal of Advanced Research 2 (3), 253-264, 2011
552011
Towards automated cyber decision support: A case study on network segmentation for security
N Wagner, CŞ Şahin, M Winterrose, J Riordan, J Pena, D Hanson, ...
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-10, 2016
512016
Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks
J Kusyk, MU Uyar, CS Sahin
Evolutionary Intelligence 10, 95-117, 2018
422018
Bio-inspired topology control for knowledge sharing mobile agents
E Urrea, CŞ Şahin, İ Hökelek, MÜ Uyar, M Conner, G Bertoli, C Pizzo
Ad Hoc Networks 7 (4), 677-689, 2009
382009
Genetic algorithms for self-spreading nodes in manets
CS Sahin, E Urrea, MU Uyar, M Conner, I Hokelek, M Conner, G Bertoli, ...
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
362008
Design of genetic algorithms for topology control of unmanned vehicles
CS Sahin, E Urrea, MU Uyar, M Conner, G Bertoli, C Pizzo
International Journal of Applied Decision Sciences 3 (3), 221-238, 2010
352010
Multi-source Multi-modal Activity Recognition in Aerial Video Surveillance
RI Hammoud, CS Sahin, EP Blasch, BJ Rhodes
Computer Vision and Pattern Recognition Workshops (CVPRW), 2014 IEEE …, 2014
342014
Multi-source multi-modal activity recognition in aerial video surveillance
R Hammoud, CS Sahin, E Blasch
US Patent 9,934,453, 2018
312018
A Reverse Approach to Named Entity Extraction and Linking in Microposts.
K Greenfield, RS Caceres, M Coury, K Geyer, Y Gwon, J Matterer, ...
# Microposts, 67-69, 2016
262016
Quantifying the mission impact of network-level cyber defensive mitigations
N Wagner, CŞ Şahin, M Winterrose, J Riordan, D Hanson, J Peña, ...
The Journal of Defense Modeling and Simulation 14 (3), 201-216, 2017
222017
Self-deployment of mobile agents in manets for military applications
CS Sahin, E Urrea, MU Uyar, M Conner, I Hokelek, G Bertoli, C Pizzo
Army Science Conference, 1-8, 2008
222008
Markov Chain Analysis of Self-organizing Mobile Nodes: Self-organizing Mobile Nodes
CŞ Şahin, S Gundry, MU Uyar
Journal of Intelligent & Robotic Systems 67, 133-153, 2012
212012
Systems and methods evaluating password complexity and strength
CS Sahin, RD Lychev, N Wagner
US Patent 10,546,116, 2020
202020
Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach
N Wagner, CŞ Şahin, J Pena, WW Streilein
Advances in Nature-Inspired Computing and Applications, 1-25, 2019
202019
Capturing the security effects of network segmentation via a continuous-time markov chain model
N Wagner, CŞ Şahin, J Pena, J Riordan, S Neumayer
Proceedings of the 50th Annual Simulation Symposium, 1-12, 2017
202017
Self organization for area coverage maximization and energy conservation in mobile ad hoc networks
CŞ Şahin, MÜ Uyar, S Gundry, E Urrea
Transactions on Computational Science XV: Special Issue on Advances in …, 2012
202012
Uniform distribution of mobile agents using genetic algorithms for military applications in manets
CS Sahin, E Urrea, MU Uyar, M Conner, I Hokelek, G Bertoli, C Pizzo
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
202008
Analysis of emergent behavior for ga-based topology control mechanism for self-spreading nodes in MANETs
S Gundry, J Zou, E Urrea, CS Sahin, J Kusyk, MU Uyar
Advances in Intelligent Modelling and Simulation: Artificial Intelligence …, 2012
192012
3D genetic algorithms for underwater sensor networks
J Zou, S Gundry, J Kusyk, MÜ Uyar, CS Sahin
International Journal of Ad Hoc and Ubiquitous Computing 13 (1), 10-22, 2013
172013
系统目前无法执行此操作,请稍后再试。
文章 1–20