Segui
Stephen M. George
Titolo
Citata da
Citata da
Anno
DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response
SM George, W Zhou, H Chenji, M Won, YO Lee, A Pazarloglou, R Stoleru, ...
IEEE Communications Magazine 48 (3), 128-136, 2010
3342010
Asymmetric event-driven node localization in wireless sensor networks
R Stoleru, T He, SS Mathiharan, SM George, JA Stankovic
IEEE transactions on parallel and distributed systems 23 (4), 634-642, 2011
342011
Towards robustness and energy efficiency of cut detection in wireless sensor networks
M Won, SM George, R Stoleru
Ad Hoc Networks 9 (3), 249-264, 2011
292011
RE2-CD: Robust and Energy Efficient Cut Detection in Wireless Sensor Networks
M Won, SM George, R Stoleru
Wireless Algorithms, Systems, and Applications: 4th International Conference …, 2009
72009
Quantifying tactical risk: A framework for statistical classification using MECH
X Wang, S George, J Lin, JC Liu
Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th …, 2015
62015
MECH: A model for predictive analysis of human choices in asymmetric conflicts
S George, X Wang, JC Liu
Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th …, 2015
52015
Risk management in asymmetric conflict: using predictive route reconnaissance to assess and mitigate threats
J Lin, B Qu, X Wang, SM George, JC Liu
Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th …, 2015
52015
MECH: Algorithms and Tools for Automated Assessment of Potential Attack Locations
S George, X Wang, J Lin, B Qu, JC Liu, ...
Technical report, Texas A & M University, College Station, 2015
22015
Demo abstract: Signal reconstruction with subnyquist sampling using wireless sensor networks
A Pazarloglou, S George, R Stoleru, R Gutierrez-Osuna
2009 International Conference on Information Processing in Sensor Networks …, 2009
22009
Keeping Navy Port Supply Operations Resilient In The Face Of Cyberattacks
J Alexander, S George, G Buck, J Griffin
U.S. Naval Institute Proceedings, 2022
2022
MECH: Algorithms and Tools for Automated Assessment of Potential Attack Locations (Software User Guide)
S George, X Wang, J Lin, B Qu, JC Liu, ...
2015
Measurement to Intelligence: Feature Extraction, Modeling and Predictive Analysis of Asymmetric Conflict Events
SM George
2014
DT-GIS system for tactical pattern exploration in asymmetric conflicts
X Wang, J Lin, JC Liu, S George
Strategic Planning and Tactical Situational Awareness Using MECH1
J Lin, B Qu, X Wang, JC Liu, S George
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14