|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3691 occurrences of 1860 keywords
|
|
|
Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Michael Losavio, Adel Elmaghraby, Deborah W. Keeling |
International Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Javek Ikbal |
Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Brian T. Geffert |
Health Insurance Portability and Accountability Act (HIPAA): Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean Scanlon |
Application Security: World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Glenn Cater |
Event Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey Davis |
Corporate Security: IT Organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kate Borten |
Privacy: Healthcare Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bonnie A. Goins Pilewski |
Critical Business Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Daniel D. Houser |
Passwords and Policy Threat Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Robby Fussell |
Next-Generation Security Application Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Skoudis |
Open Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mostafa Sedighizadeh, Alireza Rezazadeh |
Adaptive Self-Tuning Wavelet Neural Network Controller for a Proton Exchange Membrane Fuel Cell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 221-245, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Anuradha M. Annaswamy, Jinho Jang, Eugene Lavretsky |
Robust Adaptive Control Revisited: Semi-global Boundedness and Margins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 21-39, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Ali Reza Mehrabian, Mohammad Bagher Menhaj |
Stick-Slip Friction Compensation Using a General Purpose Neuro-Adaptive Controller with Guaranteed Stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 179-203, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Nhan T. Nguyen, Stephen A. Jacklin |
Stability, Convergence, and Verification and Validation Challenges of Neural Net Adaptive Flight Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 77-110, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Y. D. Song, Liguo Weng, Medorian D. Gheorghiu |
Pitch-Depth Control of Submarine Operating in Shallow Water via Neuro-adaptive Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 165-178, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Sampath Yerramalla, Edgar Fuller, Bojan Cukic |
Dynamic Allocation in Neural Networks for Adaptive Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 111-139, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Helen Yu |
Network Complexity Analysis of Multilayer Feedforward Artificial Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 41-55, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Tim Smith, Jim Barhorst, James M. Urnes |
Design and Flight Test of an Intelligent Flight Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 57-76, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaoou Li, Wen Yu 0001 |
Modeling of Crude Oil Blending via Discrete-Time Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 205-220, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Dragan Djurdjanovic, Jianbo Liu, Kenneth A. Marko, Jun Ni 0002 |
Immune Systems Inspired Approach to Anomaly Detection, Fault Localization and Diagnosis in Automotive Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Applications of Neural Networks in High Assurance Systems ![In: Applications of Neural Networks in High Assurance Systems, pp. 141-163, 2010, Springer, 978-3-642-10689-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | David M. Russinoff |
A Mechanically Verified Commercial SRT Divider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 23-63, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Anthony C. J. Fox, Michael J. C. Gordon, Magnus O. Myreen |
Specification and Verification of ARM Hardware and Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 221-247, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Konrad Slind, Guodong Li, Scott Owens |
Compiling Higher Order Logic by Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 193-220, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Michael W. Whalen, David A. Greve, Lucas G. Wagner |
Model Checking Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 381-428, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Warren A. Hunt Jr., Sol Swords, Jared Davis, Anna Slobodová |
Use of Formal Verification at Centaur Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 65-88, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Raymond J. Richards |
Modeling and Security Analysis of a Commercial Real-Time Operating System Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 301-322, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Torben Amtoft, John Hatcliff, Edwin Rodríguez, Robby, Jonathan Hoag, David A. Greve |
Specification and Checking of Software Contracts for Conditional Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 341-379, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Sally Browning, Philip Weaver |
Designing Tunable, Verifiable Cryptographic Hardware Using Cryptol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 89-143, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Matthew Wilding, David A. Greve, Raymond J. Richards, David S. Hardin |
Formal Verification of Partition Management for the AAMP7G Microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 175-191, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | David A. Greve |
Information Security Modeling and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 249-299, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Gerwin Klein, Thomas Sewell, Simon Winwood |
Refinement in the Formal Verification of the seL4 Microkernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 323-339, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Panagiotis Manolios, Sudarshan K. Srinivasan |
Verifying Pipelines with BAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 145-174, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Matt Kaufmann, J Strother Moore |
ACL2 and Its Applications to Digital System Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Design and Verification of Microprocessor Systems for High-Assurance Applications ![In: Design and Verification of Microprocessor Systems for High-Assurance Applications., pp. 1-21, 2010, Springer, 978-1-4419-1538-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan (eds.) |
Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classical and Quantum Information Assurance Foundations and Practice ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![SPIE, 978-0-8194-7610-4 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
27 | Dusko Pavlovic |
Geometry of abstraction in quantum computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classical and Quantum Information Assurance Foundations and Practice ![In: Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
27 | Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Salvail, Michel Riguidel, Andrew J. Shields, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John G. Rarity, Harald Weinfurter, Anton Zeilinger, Christian Monyk |
Quantum key distribution and cryptography: a survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Classical and Quantum Information Assurance Foundations and Practice ![In: Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
27 | Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen |
Security in MANETs using reputation-adjusted routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734406, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Richard J. Hummel, Errin W. Fulp |
High-speed packet filtering utilizing stream processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440I, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jieyan Fan, Dapeng Wu 0001, Antonio Nucci, Ram Keralapura, Lixin Gao 0001 |
Identifying hidden voice and video streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440F, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hidenao Abe, Shusaku Tsumoto |
A method to characterize dataset based on objective rule evaluation indices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440D, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Min Xu, Zhang Zhang, Luping Duan |
Classification data mining method based on dynamic RBF neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440N, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Alejandra López-Caloca, Elvia Martínez-Viveros, José Ignacio Chapela-Castañares |
Application of a clustering-remote sensing method in analyzing security patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734407, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Munesh Kumar, Shoaib Siddique, Humera Noor |
Feature-based alert correlation in security systems using self organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734404, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Wei Wang 0084, Hong Man |
Exploring social relations for the intrusion detection in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734402, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vimalathithan Subramanian, Sithu D. Sudarsan, Remzi Seker, Rathinasamy B. Lenin, Srinivasan Ramaswamy |
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734405, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jean Lancrenon, Roland Gillard, Thierry Fournel |
Remote object authentication: confidence model, cryptosystem and protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440J, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shu-qing Peng, Huining Duan, Deyun Chen |
Design and implementation of workflow engine for service-oriented architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440L, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Shoji Hirano |
Temporal data mining for hospital management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440A, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Minhua Wu, Shuang Li |
Design of data warehouse in teaching state based on OLAP and data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440M, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati |
Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440E, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734408, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Nathaniel Albritton, David Whitener, Randel Burnett, Robert Caspers, Stephen Moren, Thomas Alexander, William Maddox III, William Albritton Jr. |
Autonomous journaling response using data model LUTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734409, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Peter Schallauer, Werner Bailer, Albert Hofmann, Roland Mörzinger |
SAM: an interoperable metadata model for multimodal surveillance applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440C, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Sajid Hussain, Md. Shafayat Rahman |
Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440G, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | André Ricardo Abed Grégio, Isabela L. Oliveira, Rafael D. C. Santos, Adriano M. Cansian, Paulo L. de Geus |
Malware distributed collection and pre-classification system using honeypot technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440B, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Considerations and foundations for Botnet simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 73440H, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Alan Harris, Mouhamad K. Al Akkoumi, James J. Sluss Jr. |
A comparison of passive optical network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA, pp. 734403, 2009, SPIE, 978-0-8194-7610-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![SPIE, 978-0-8194-7164-2 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama |
Application of data mining to medical risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697308, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Doracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias |
The epidemic threshold theorem with social and contact heterogeneity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730A, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Addressing security issues related to virtual institute distributed activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697303, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu |
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730B, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati |
Adaptive Markov feature estimation and categorization using the projection-slice theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730J, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gilbert Hendry, Shanchieh Jay Yang |
Intrusion signature creation via clustering anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730C, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sajid Hussain, Richard Peters, Daniel L. Silver |
Using received signal strength variation for surveillance in residential areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730L, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jie Su, Yahui Liu |
Distributed intrusion detection system based on grid security model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697306, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jim Brander, Alex Lupu |
Is mining of knowledge possible? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697307, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Thomas G. L. Allen |
An innovative middle tier design for protecting federal privacy act data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697304, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Tong Wang, Jie Su |
An improved clone selection immune algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730O, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Marco Carvalho 0001, Richard Ford, William H. Allen, Gerald A. Marin |
Securing MANETs with BITSI: danger theory and mission continuity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730D, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Tong Wang, Jie Su |
An immunity-based model for dynamic distributed intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730P, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, Vishwas Sharma, N. Balakrishnan 0001 |
Usefulness of DARPA dataset for intrusion detection system evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730G, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr. |
Performance comparison of the automatic data reduction system (ADRS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730H, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, N. Balakrishnan 0001 |
Improvement in minority attack detection with skewness in network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730N, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead |
Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730I, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Brian Argauer, Shanchieh Jay Yang |
VTAC: virtual terrain assisted impact assessment for cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730F, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead |
Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730M, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jared Holsopple, Shanchieh Jay Yang, Brian Argauer |
Virtual terrain: a security-based representation of a computer network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730E, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis |
A data mining approach to intelligence operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697309, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao |
Research on parallel algorithm for sequential pattern mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730Q, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sheela V. Belur, Jonathan Gloster |
Mathematical model for security effectiveness figure of merit and its optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697305, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel |
Integrated mandatory access control for digital data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 697302, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Tao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi |
A new approach to chemical agent detection, classification, and estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008, pp. 69730K, 2008, SPIE, 978-0-8194-7164-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![SPIE, 978-0-8194-6692-1 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Luc Longpré, Vladik Kreinovich |
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 155-173, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis |
Cryptography and Cryptanalysis Through Computational Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 1-49, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ki-Won Yeom |
Immune-inspired Algorithm for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 129-154, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne |
Fingerprint Recognition Using a Hierarchical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 175-199, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sangkyun Kim |
Governance of Information Security: New Paradigm of Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 235-254, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Paolo Mercorelli, Alexander Frick |
Industrial Applications Using Wavelet Packets for Gross Error Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 89-127, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper |
Smart Card Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 201-233, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shiguo Lian |
Multimedia Content Protection Based on Chaotic Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 51-78, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nadia Nedjah, Luiza de Macedo Mourelle |
Evolutionary Regular Substitution Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence in Information Assurance and Security ![In: Computational Intelligence in Information Assurance and Security, pp. 79-88, 2007, Springer, 978-3-540-71077-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sheila B. Banks, Martin R. Stytz |
Bot armies as threats to network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657002, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700F, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Kirk A. Dunkelberger |
Semantic search via concept annealing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700K, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hongda Chen 0001, Genshe Chen, Erik Blasch, Martin Kruger, Irma Sityar |
Analysis and visualization of large complex attack graphs for networks security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657004, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 8092 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|