Multi-entity Bayesian networks for situation assessment E Wright, S Mahoney, K Laskey, M Takikawa, T Levitt Proceedings of the Fifth International Conference on Information Fusion …, 2002 | 76 | 2002 |
Multiplicative factorization of noisy-max M Takikawa, B D'Ambrosio arXiv preprint arXiv:1301.6742, 2013 | 63 | 2013 |
Security situation assessment and response evaluation (SSARE) B D'Ambrosio, M Takikawa, J Fitzgerald, D Upper, S Mahoney Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 54 | 2001 |
Real-time inference with large-scale temporal bayes nets M Takikawa, B D'Ambrosio, E Wright arXiv preprint arXiv:1301.0603, 2012 | 48 | 2012 |
MEBN logic: A key enabler for network centric warfare PCG da Costa, F Fung, KB Laskey, M Pool, M Takikawa, EJ Wright 10th Annual Command and Control Research and Technology Symposium, 2005 | 36 | 2005 |
PLASMA: combining predicate logic and probability for information fusion and decision support F Fung, KB Laskey, M Pool, M Takikawa, EJ Wright | 16 | 2006 |
Cyber ecology: Looking to ecology for insights into information assurance J Jorgensen, P Rossignol, M Takikawa, D Upper Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 13 | 2001 |
Representation for dynamic situation modeling B D’Ambrosio, M Takikawa, D Upper Technical report, Information Extraction and Transport, Inc, 2000 | 9 | 2000 |
Representations and algorithms for efficient inference in Bayesian networks M Takikawa Oregon State University, 1999 | 7 | 1999 |
Security situation assessment and response evaluation (SSARE)[C] D AMBROSIO, M Takikawa, D Upper Proc of the DARPA Information Survivability Conference&Exposition, 387-394, 2001 | 5 | 2001 |
Performance Evaluation for Automated Threat Detection. R Schrag, M Takikawa, P Goger, J Eilbert J. Adv. Inf. Fusion 2 (2), 77-98, 2007 | 4 | 2007 |
Credibility Models. C Twardy, E Wright, S Canon, M Takikawa BMA, 2007 | 4 | 2007 |
A revised Leda language definition RK Pandey, W Pesch, J Shur, M Takikawa | 4 | 1993 |
Scoring Hypotheses from Threat Detection Technologies. RC Schrag, M Takikawa AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection, 21-28, 2006 | 3 | 2006 |
CLEDA-LEDA with constraint logic programming M Takikawa, T Budd | 3 | 1993 |
Scoring Alerts from Threat Detection Technologies. RC Schrag, M Takikawa, P Goger, J Eilbert AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection, 29-36, 2006 | 2 | 2006 |
Multiworld augmented term rewriting M Takikawa, LA Crowl | | 1994 |
Cleda--Leda With Constant Logic Programming TA Budd, M Takikawa Oregon State University, 1993 | | 1993 |
Cyber ecology: looking to ecology for insights into information assurance M Takikawa | | |
Scoring Hypotheses from Threat Detection Technologies: Analogies to Machine Learning Evaluation RC Schrag, M Takikawa | | |