James H. Graham
According to our database1,
James H. Graham
authored at least 95 papers
between 1971 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
1975
1980
1985
1990
1995
2000
2005
2010
2015
0
1
2
3
4
5
6
7
8
9
10
1
2
1
1
2
1
1
1
1
2
1
1
2
1
2
2
1
1
1
5
2
5
7
7
3
5
5
6
2
4
4
3
4
1
1
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
An Immersive Visualization Tool for Teaching and Simulation of Smart Grid Technologies.
CoRR, 2015
2014
Pedestrian detection using mixed partial derivative based histogram of oriented gradients.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
2013
IEEE Trans. Image Process., 2013
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices.
Int. J. Crit. Infrastructure Prot., 2013
An interactive educational drawing system using a humanoid robot and light polarization.
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Novel variational approach for the perspective shape from shading problem using calibrated images.
Proceedings of the IEEE International Conference on Image Processing, 2013
Deformable models for random small-size objects: Case of lung nodules in CT tomography.
Proceedings of the IEEE International Conference on Acoustics, 2013
A Non-invasive Method for Measuring Blood Flow Rate in Superficial Veins from a Single Thermal Image.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013
2012
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012
Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices.
Proceedings of the Critical Infrastructure Protection VI, 2012
2011
Differential Drive Robot Model, Simulation, and Verification.
Int. J. Comput. Their Appl., 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Evaluation of geometric feature descriptors for detection and classification of lung nodules in low dose CT scans of the chest.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
Active Learning Mashups for Tablet Classrooms.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011
Intelligent Power Management for a Solar Parking Structure for Plug-in Electric Vehicles.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011
2010
Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes.
Int. J. Comput. Their Appl., 2010
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2010
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the International Conference on Image Processing, 2010
Statistical modeling of the lung nodules in low dose computed tomography scans of the chest.
Proceedings of the International Conference on Image Processing, 2010
Predicting Makespan with Latin Square Replication on Computational Grids.
Proceedings of the ISCA 25th International Conference on Computers and Their Applications, 2010
2009
New Software Metrics for Evaluation and Comparison of Advanced Power Management Systems.
IEEE Syst. J., 2009
Proceedings of the Advances in Visual Computing, 5th International Symposium, 2009
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems.
Proceedings of the Critical Infrastructure Protection III, 2009
Intrusion Detection System for SCADA Networks.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009
Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009
Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements.
Proceedings of the Bioinformatics and Computational Biology, 2009
Reliability through Replication and Permutation on Desktop Grids.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009
2008
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements.
Int. J. Inf. Manag., 2008
Proceedings of the Critical Infrastructure Protection II, 2008
A Method for Detecting Windows Rootkits.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008
An Ontological Model for Assessing Security Risk Impact in SCADA Systems.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008
2007
Demand Forecasting Using Intelligent Agents with Application to a Call Processing Center.
Int. J. Comput. Their Appl., 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Improvements in SCADA and DCS Systems Security.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007
Testing Security Enhanced SCADA Communication Protocols.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
Identity Management for Advanced Health Care Systems.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
2006
Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic.
Proceedings of the IEEE International Conference on Systems, 2006
An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006
Dynamic Authentication Using Keystroke Biometrics.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006
Security enhancement for SCADA communication protocols using augmented vulnerability trees.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
Security-enhanced remote terminal units for SCADA networks.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006
2005
Computer System Security Threat Evaluation Based Upon Artificial Immunity Model and Fuzzy Logic.
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005
Agent-Based Architecture for Intelligent Semi-Autonomous Robots.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005
Secure SCADA Communications, Monitoring and Control over the Internet.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005
Event Processing Software for Intelligent Security Monitoring and Alarm System.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005
2004
Computer Immunology and Neural Network Models for Masquerader Detection.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004
Security Considerations in DNP3 SCADA Systems.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004
2003
A Parallel Inductive Logic Programming Data Mining System for Drug Discovery.
Int. J. Comput. Their Appl., 2003
Proceedings of the IEEE International Conference on Systems, 2003
Call Center Demand Forecasting using Intelligent Agents.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003
Advanced Simulation Architecture for Intelligent Autonomous Robots.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003
Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003
2002
Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes.
Int. J. Comput. Their Appl., 2002
A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
Fuzzy Threat Evaluation in Computer Security.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002
Multi-level Biometric-Based Authentication System.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002
2001
IEEE Trans. Syst. Man Cybern. Syst., 2001
Guest Editor's Introduction.
Int. J. Comput. Their Appl., 2001
An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001
An Approach to Parallel Data Mining for Pharmacophore Discovery.
Proceedings of the ISCA 10th International Conference on Intelligent Systems, 2001
Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture.
Proceedings of the ISCA 10th International Conference on Intelligent Systems, 2001
2000
An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis.
Proceedings of the Abstraction, 2000
Computer-based monitoring and fault diagnosis for chemical processes.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000
Knowledge Based Planning of Communications Networks to Support Military Ground Operations.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000
High Performance Computing: An Agent-based Approach.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000
1999
Proceedings of the 31st conference on Winter simulation: Simulation, 1999
1998
Proceedings of the 30th conference on Winter simulation, 1998
1996
J. Intell. Fuzzy Syst., 1996
1995
1994
IEEE Trans. Syst. Man Cybern. Syst., 1994
Simul., 1994
1993
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993
Proceedings of the ACM 21th Conference on Computer Science, 1993
1992
Proceedings of the 24th Winter Simulation Conference, 1992
1991
Proceedings of the 1991 IEEE International Conference on Robotics and Automation, 1991
1989
IEEE Trans. Robotics Autom., 1989
Proceedings of the IEEE International Conference on Systems, 1989
1988
Proceedings of the 1988 IEEE International Conference on Robotics and Automation, 1988
1985
IEEE Trans. Computers, 1985
1984
IEEE Trans. Syst. Man Cybern., 1984
1982
IEEE Trans. Syst. Man Cybern., 1982
1971
Comput. Aided Des., 1971