Ira S. Moskowitz
Orcid: 0000-0002-9862-6452
According to our database1,
Ira S. Moskowitz
authored at least 76 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Responsible Integration of Large Language Models (LLMs) in Navy Operational Plan Generation.
Proceedings of the AAAI 2024 Spring Symposium Series, 2024
2023
A Quantum-like Model of Interdependence for Embodied Human-Machine Teams: Reviewing the Path to Autonomy Facing Complexity and Uncertainty.
Entropy, September, 2023
2022
2021
Proceedings of the Engineering Artificially Intelligent Systems, 2021
2018
J. Softw. Evol. Process., 2018
Proceedings of the 2018 AAAI Spring Symposia, 2018
Meta-Agents: Managing Dynamism in the Internet of Things (IoT) with Multi-agent Networks.
Proceedings of the 2018 AAAI Spring Symposia, 2018
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Proceedings of the Autonomy and Artificial Intelligence: A Threat or Savior?, 2017
2016
Proceedings of the Context-Enhanced Information Fusion, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 2016 American Control Conference, 2016
Proceedings of the 2016 AAAI Spring Symposia, 2016
Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security.
Proceedings of the 2016 AAAI Spring Symposia, 2016
Proceedings of the 2016 AAAI Spring Symposia, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the 2015 AAAI Spring Symposia, 2015
Proceedings of the 2015 AAAI Spring Symposia, 2015
2014
Proceedings of the 10th International Conference on Communications, 2014
Proceedings of the Complex Adaptive Systems 2014 Conference, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Joint optimal placement and energy allocation of underwater sensors in a tree topology.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014
2013
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013
On the optimal placement of underwater sensors in a tree shaped multi-hop hierarchical network.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013
2012
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels.
IEEE Trans. Inf. Forensics Secur., 2012
Algebraic information theory and stochastic resonance for binary-input binary-output channels.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012
2011
On the Partial Ordering of the Discrete Memoryless Channels Arising in Cooperative Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011
2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
2008
Proceedings of the 2008 IEEE International Performance, 2008
2006
Difference of Sums Containing Products of Binomial Coefficients and Their Logarithms.
SIAM Rev., 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Timing channels, anonymity, mixes, and spikes.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006
2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
2003
Int. J. Artif. Intell. Tools, 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
A Study of Inference Problems in Distributed Databases.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Randomly roving agents for intrusion detection.
Proceedings of the Database and Application Security XV, 2001
2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
Proceedings of the Data and Application Security, 2000
1999
Proceedings of the Information Hiding, Third International Workshop, 1999
A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
Proceedings of the 1998 Workshop on New Security Paradigms, 1998
Bayesian Methods to the Database Inference Problem.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Proceedings of the 1997 Workshop on New Security Paradigms, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
The Modulated-Input Modulated-Output Model.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
1993
1992
IEEE Trans. Inf. Theory, 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990