Feature extraction and feature selection for classifying cyber traffic threats
Friendly casualty outcomes: choice of counter improvised explosive device tactics matters on the asymmetric battlefield