Follow
Martin Kuehnhausen
Title
Cited by
Cited by
Year
Trusting smartphone apps? To install or not to install, that is the question
M Kuehnhausen, VS Frost
2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2013
812013
Generalized probabilistic approximations of incomplete data
JW Grzymala-Busse, PG Clark, M Kuehnhausen
International Journal of Approximate Reasoning 55 (1), 180-196, 2014
782014
Framework for assessing the trustworthiness of cloud resources
M Kuehnhausen, VS Frost, GJ Minden
2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2012
322012
Experiences from a transportation security sensor network field trial
DT Fokum, VS Frost, D DePardo, M Kuehnhausen, AN Oguna, LS Searl, ...
2009 IEEE Globecom Workshops, 1-6, 2009
222009
Application of the Java message service in mobile monitoring environments
M Kuehnhausen, VS Frost
Journal of network and computer applications 34 (5), 1707-1716, 2011
162011
Local probabilistic approximations for incomplete data
PG Clark, JW Grzymala-Busse, M Kuehnhausen
International Symposium on Methodologies for Intelligent Systems, 93-98, 2012
122012
An open-system transportation security sensor network: Field-trial experiences
DT Fokum, VS Frost, M Kuehnhausen, D DePardo, AN Oguna, LS Searl, ...
IEEE transactions on vehicular technology 59 (8), 3942-3955, 2010
92010
Anomaly detection with sensor data for distributed security
B Quanz, H Fei, J Huan, J Evans, V Frost, G Minden, D Deavours, L Searl, ...
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
82009
Service oriented architecture for monitoring Cargo in motion along trusted corridors
M Kuehnhausen
University of Kansas, 2009
82009
Trusting smartphone Apps? To install or not to install, that is the question. 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness …
M Kuehnhausen, VS Frost
IEEE. https://doi. org/10.1109/CogSIMA, 2013
72013
Mining incomplete data with many missing attribute values. A comparison of probabilistic and rough set approaches
PG Clark, JW Grzymala-Busse, M Kuehnhausen
International Conference on Intelligent Systems and Applications, INTELLI …, 2013
72013
Transportation Security SensorNet: a service‐oriented architecture for cargo monitoring
M Kuehnhausen, VS Frost
Journal of Systems and Information Technology 13 (4), 369-388, 2011
52011
Framework for analyzing soap messages in web service environments
M Kuehnhausen, VS Frost
International Journal of Web Services Practices 5 (1), 1-9, 2010
42010
Implementing web services: conflicts between security features and publish/subscribe communication protocols
E Komp, VS Frost, M Kuehnhausen
University of Kansas, Lawrence, KS, ITTC Tech. Rep. ITTC-FY2010-TR-41420-19, 2010
32010
A Framework for Knowledge Derivation Incorporating Trust and Quality of Data
M Kuehnhausen
University of Kansas, 2013
2013
KSJ
LS Searl, DDP Komp, D Deavours, M Kuehnhausen
2011
Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security
GJ Minden, VS Frost, JB Evans, J Huan, R Jiang, LS Searl, D DePardo, ...
2011
Advancing SensorNet Technologies to Monitor Trusted Corridors
DD Deavours, JB Evans, VS Frost, GJ Minden, DW Petr, D DePardo, ...
2010
Service Oriented Architecture for Monitoring Cargo in Motion Along Trusted Corridors
VS Frost, DT Fokum, M Kuehnhausen, M Zeets, LS Searl, E Komp, ...
The system can't perform the operation now. Try again later.
Articles 1–19