3 |
Mobile Active Authentication via Linguistic Modalities
|
|
|
|
In: DTIC (2015)
|
|
BASE
|
|
Show details
|
|
7 |
Making Semantic Information Work Effectively for Degraded Environments
|
|
|
|
In: DTIC (2013)
|
|
BASE
|
|
Show details
|
|
8 |
Multinational Experiment 7: Access to the Global Commons. Objective 3.3 Lexicon and Abbreviations. Version 1.1
|
|
In: DTIC (2012)
|
|
BASE
|
|
Show details
|
|
9 |
Robust and Efficient Anti-Phishing Techniques
|
|
|
|
In: DTIC (2012)
|
|
BASE
|
|
Show details
|
|
11 |
Reliable Electronic Text: The Elusive Prerequisite for a Host of Human Language Technologies
|
|
|
|
In: DTIC (2010)
|
|
BASE
|
|
Show details
|
|
12 |
PCAL: Language Support for Proof-Carrying Authorization Systems
|
|
|
|
In: DTIC (2009)
|
|
BASE
|
|
Show details
|
|
13 |
System-Call Based Problem Diagnosis for PVFS
|
|
|
|
In: DTIC (2009)
|
|
BASE
|
|
Show details
|
|
14 |
Words Mean Things: The Case for Information System Attack and Control System Attack
|
|
|
|
In: DTIC (2008)
|
|
BASE
|
|
Show details
|
|
15 |
The Error Is the Clue: Breakdown In Human-Machine Interaction
|
|
|
|
In: DTIC (2006)
|
|
BASE
|
|
Show details
|
|
16 |
Adding Semantic Support to Existing UDDI Infrastructure
|
|
|
|
In: DTIC AND NTIS (2005)
|
|
BASE
|
|
Show details
|
|
17 |
A GH-Based Ontology to Support Applications for Automating Decision Support
|
|
|
|
In: DTIC (2005)
|
|
BASE
|
|
Show details
|
|
18 |
A Formal Syntax and Semantics for the GSPML Language
|
|
|
|
In: DTIC AND NTIS (2005)
|
|
BASE
|
|
Show details
|
|
19 |
Developing Secure Agent Systems Using Delegation Based Trust Management
|
|
|
|
In: DTIC AND NTIS (2005)
|
|
BASE
|
|
Show details
|
|
20 |
Enhancing P3P Framework through Policies and Trust
|
|
|
|
In: DTIC AND NTIS (2005)
|
|
BASE
|
|
Show details
|
|
|
|