An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications Conference Paper December, 2013
Multi-Objective Optimization of a Wrought Magnesium Alloy for High Strength and Ductility Conference Paper November, 2013
Comparative analysis of data collection methods for individualized modeling of radiologists' visual similarity judgments... Journal November, 2013
Redeye text analysis workbench: Actionable intelligence from non-actionable data... Conference Paper November, 2013
A Learning System for Discriminating Variants of Malicious Network Traffic... Conference Paper October, 2013
Massively Scalable Near Duplicate Detection in Streams of Documents using MDSH Conference Paper October, 2013