James Riordan

Orcid: 0000-0001-6516-9446

According to our database1, James Riordan authored at least 24 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Verification and Validation for a Digital Twin for Augmenting Current SORA Practices with Air-to-Air Collision Hazards Prediction from Small Uncooperative Flying Objects.
J. Intell. Robotic Syst., September, 2024

Cooperative Unmanned Aerial and Surface Vehicles for Extended Coverage in Maritime Environments.
IEEE Access, 2024

2023
Segmentation of Drone Collision Hazards in Airborne RADAR Point Clouds Using PointNet.
CoRR, 2023

Airborne Sense and Detect of Drones using LiDAR and adapted PointPillars DNN.
CoRR, 2023

Performance Analysis of Compiler Support for Parallel Evaluation of C++ Constant Expressions.
Proceedings of the Software, System, and Service Engineering, 2023

Porting SYCL accelerated neural network frameworks to edge devices.
Proceedings of the 2023 International Workshop on OpenCL, 2023

Compiler Support for Parallel Evaluation of C++ Constant Expressions.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

2022
A Review of the Legal, Regulatory and Practical Aspects Needed to Unlock Autonomous Beyond Visual Line of Sight Unmanned Aircraft Systems Operations.
J. Intell. Robotic Syst., 2022

2020
Vision-Based Localization System Suited to Resident Underwater Vehicles.
Sensors, 2020

2018
Real-Time Underwater StereoFusion.
Sensors, 2018

GPUE: Graphics Processing Unit Gross-Pitaevskii Equation solver.
J. Open Source Softw., 2018

2017
Capturing the security effects of network segmentation via a continuous-time markov chain model.
Proceedings of the 50th Annual Simulation Symposium, Virginia Beach, VA, USA, April 23, 2017

2016
Towards automated cyber decision support: A case study on network segmentation for security.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2015
Agent-based simulation for assessing network security risk due to unauthorized hardware.
Proceedings of the Symposium on Agent-Directed Simulation, 2015

2014
Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity.
CoRR, 2014

Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2010
EMBER: a global perspective on extreme malicious behavior.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

2009
Deriving Expertise Profiles from Tags.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2007
Boundary Detection and Containment of Local Worm Infections.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

2001
Die PERSEUS Systemarchitektur.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

2000
Target Naming and Service Apoptosis.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

1998
Environmental Key Generation Towards Clueless Agents.
Proceedings of the Mobile Agents and Security, 1998

A Certified E-Mail Protocol.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998


  Loading...