|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3691 occurrences of 1860 keywords
|
|
|
Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | André Grégio, Rafael D. C. Santos, Antonio Montes |
Evaluation of data mining techniques for suspicious network activity classification using honeypots data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657006, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ting Wei, Yu Wu, Yinguo Li |
A flexible self-learning model based on granular computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700M, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Brian Ulicny, Ken Baclawski, Amy L. Magnus |
New metrics for blog mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700I, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati, Denis Grishin |
Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700J, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vijay P. Shah, Nicolas H. Younan, Surya S. Durbha, Roger L. King |
Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657009, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Maxwell G. Dondo, Peter Mason, Nathalie Japkowicz, Reuben Smith |
AutoCorrel II: a neural network event correlation approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700H, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Basabdatta Sen Bhattacharya, Stephen B. Furber |
Maximising information recovery from rank-order codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700C, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Cluster analysis of temporal trajectories of hospital laboratory examinations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700E, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, N. Balakrishnan 0001 |
Selection of intrusion detection system threshold bounds for effective sensor fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657007, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jing Hu, Jianbo Gao, Nageswara S. V. Rao |
Defending against Internet worms using a phase space method from chaos theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657003, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700A, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Zhongxiao Hao, Chi Liu |
Selecting materialized views using random algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700N, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Mining unknown patterns in data when the features are correlated. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657008, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Anca Doloc-Mihu, Vijay V. Raghavan 0001 |
Three-way aspect model (TWAPM) and co-training for image retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700L, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Enabling distributed simulation multilevel security using virtual machine and virtual private network technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700B, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Robert J. Holt, Hong Man, Rainer Martini, Iraban Mukherjee, Ravi Netravali, Jing Wang |
Summary of results on optimal camera placement for boundary monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 657005, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Dong Won Kim, Joseph P. Herbert |
Supporting online learning with games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007, pp. 65700G, 2007, SPIE, 978-0-8194-6692-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![SPIE, 978-0-8194-6297-8 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Shuxin Li, Robert Lee, Sheau-Dong Lang |
Efficient mining of strongly correlated item pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624102, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jesús González-Pino, Janica Edmonds, Mauricio Papa |
Attribute selection using information gain for a fuzzy logic intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410D, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Wei-Ning Liu |
Web-based dynamic Delphi: a new survey instrument. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410I, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mark Lodato, Ismail Jouny |
A practical timing attack on RSA over a LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624111, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Thomas G. L. Allen |
Damage assessment of mission essential buildings based on simulation studies of low yield explosives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410Y, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Chi Liu, Chunying Wang |
The design and application of data warehouse during modern enterprises environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624110, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir Nikulin |
Threshold-based clustering for intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410E, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann |
Image sensor for security applications with on-chip data authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624109, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jason Hester, William Yurcik, Roy H. Campbell |
An implementation-independent threat model for group communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410M, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Kevin J. Kumpf |
End-to-end communications security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410R, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yiyu Yao |
Granular computing for data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624105, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Tong Wang 0005, Daxin Liu 0001, Xuan-Zuo Lin, Wei Sun 0005 |
Clustering method via independent components for semi-structured documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410V, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qiao Yan, Jianping Yu |
AINIDS: an immune-based network intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410U, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qiwei Lin, Gui Feng |
A novel mark embedding and attack identifying technique for watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410K, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Ekimov, James M. Sabatier |
Broad frequency acoustic response of ground/floor to human footsteps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410L, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Boris A. Galitsky, Boris Kovalerchuk |
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410G, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Genetic program based data mining to reverse engineer digital logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624103, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Suat Özdemir |
Energy efficient link layer security solution for wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624108, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir G. Krasilenko, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev, Konstantin V. Ogorodnik |
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410Z, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
An algorithmic approach to mining unknown clusters in training data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624101, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto |
Visualization of similarities and dissimilarities in rules using MDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410X, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Yuko Tsumoto |
Mining hospital management data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410W, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Jie Su, Yahui Liu |
Distributed intrusion detection system based on fuzzy rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410F, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Wenbin Qiu, Yu Wu 0001, Guoyin Wang 0001, Simon X. Yang, Jie Bai, Jieying Li |
A novel unsupervised anomaly detection based on robust principal component classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410T, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran |
Mining security events in a distributed agent society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410A, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Raymond A. Cardillo, John J. Salerno |
Detecting people of interest from internet data sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410H, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir Nikulin |
Dimensional reduction of web traffic data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410J, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Matheos Kazantzidis |
Extending key sharing: how to generate a key tightly coupled to a network security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410S, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin |
Data modeling for predictive behavior hypothesis formation and testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410P, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jidong Long, Daniel G. Schwartz, Sara Stoecklin |
Distinguishing false from true alerts in Snort by data mining patterns of alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410B, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | A. K. Checker, R. Appavu Raj |
Database architecture for data mining to aid real-time range safety decision in a test range. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 624104, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung |
A novel interacting multiple model based network intrusion detection scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410C, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Maxwell G. Dondo, Nathalie Japkowicz, Reuben Smith |
AutoCorrel: a neural network event correlation approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006, pp. 62410N, 2006, SPIE, 978-0-8194-6297-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![SPIE, 978-0-81945797-4 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
27 | Vladimir Nikulin, Alexander J. Smola |
Parametric model-based clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 190-201, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Abdelghani Bellaachia, Rajat Bhatt |
An enhanced stream mining approach for network anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 342-351, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 158-167, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal |
VMSoar: a cognitive agent for network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 72-80, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yongjun Hai, Yu Wu 0001, Guoyin Wang 0001 |
An improved unsupervised clustering-based intrusion detection method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 52-60, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin |
Shai-Hulud: The quest for worm sign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 321-329, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Chandra Pandey |
Deducing trapdoor primitives in public key encryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 81-91, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Danzhou Liu, Charles E. Hughes |
Deducing behaviors from primitive movement attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 180-189, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dongming Cai, James Theiler, Maya B. Gokhale |
Detecting a malicious executable without prior knowledge of its patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 1-12, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001 |
Knowledge extracted from trained neural networks: What's next? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 151-157, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rodolfo A. Fiorini, Gianfranco Dacquino |
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 214-225, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Shoji Hirano |
On statistical independence of a contingency matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 291-302, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Kun Zhang 0012, Zujia Xu, Bill P. Buckles |
Oblique decision tree induction using multimembered evolution strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 263-270, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Wei Xie, Feng Chu 0002, Lipo Wang, Eng Thiam Lim |
A fuzzy neural network for intelligent data processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 283-290, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran |
Efficient visualization of security events in a large agent society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 102-113, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Raymond A. Cardillo, John J. Salerno |
The pearls of using real-world evidence to discover social groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 309-320, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Qiang Wang 0010, Vasileios Megalooikonomou |
A clustering algorithm for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 31-38, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Songlun Zhao, Lawrence V. Saxton |
A study on fuzzy intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 23-30, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Moises Sudit, Adam Stotz, Michael Holender |
Situational awareness of a coordinated cyber attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 114-129, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 130-141, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yu Liu, Hong Man |
Network vulnerability assessment using Bayesian networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 61-71, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Predrag Zivic |
Information risk and security modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 142-150, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang |
Comparing various algorithms for discovering social groups with uni-party data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 168-179, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto |
Granularity and statistical independence in a contingency table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 330-341, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Deyun Chen, Shujun Pei, Zhiying Quan |
Knowledge base system visualization reasoning model based on ICON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 352-355, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Ching-Cheng Lee, Rashmi Prabhakara |
Web image retrieval using an effective topic and content-based technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 303-308, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma |
Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 226-231, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Classification of temporal sequences using multiscale matching and rough clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 202-213, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | David P. Benjamin, Adrian Walker |
Semantic encoding of relational databases in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 255-262, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Vivek Verma, Nikhil Gagvani |
Visualizing intelligence information using correlation graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 271-282, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yaping Deng, Wei Zhang |
A new method for MPLS-based recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 364-373, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Data-mining-based automated reverse engineering and defect discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 232-242, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Jie Su, Chengwei Sun |
Distributed intrusion detection system based on ARTIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 356-363, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rashid Hafeez Khokhar, Mohd. Noor Md. Sap |
Predictive fuzzy reasoning method for time series stock market data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 243-254, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yao Li 0002, Zhitang Li, Hao Tu |
Dynamic immune intrusion detection system for IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 374-, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Sheila B. Banks, Martin R. Stytz |
A taxonomy and discussion of software attack technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 92-101, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Tansel Özyer, Reda Alhajj, Ken Barker 0001 |
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 13-22, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Mian Zhou, Sheau-Dong Lang |
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security ![In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005, pp. 39-51, 2005, SPIE, 978-0-81945797-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali |
Remote Attestation of Attribute Updates and Information Flows in a UCON System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 63-80, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, Information flow, usage control, remote attestation |
26 | John Lloyd, Jan Jürjens |
Security Analysis of a Biometric Authentication System Using UMLsec and JML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 12th International Conference, MODELS 2009, Denver, CO, USA, October 4-9, 2009. Proceedings, pp. 77-91, 2009, Springer, 978-3-642-04424-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
UMLsec, Security analysis, biometric authentication, JML |
26 | Heather Goldsby, Betty H. C. Cheng, Ji Zhang |
AMOEBA-RT: Run-Time Verification of Adaptive Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS (Workshops) ![In: Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers, pp. 212-224, 2007, Springer, 978-3-540-69069-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Alec Yasinsac, Mike Burmester |
Centers of Academic Excellence: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 62-65, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Florida State University, scholarship programs |
26 | Ewen Denney, Bernd Fischer 0002 |
Certifiable Program Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPCE ![In: Generative Programming and Component Engineering, 4th International Conference, GPCE 2005, Tallinn, Estonia, September 29 - October 1, 2005, Proceedings, pp. 17-28, 2005, Springer, 3-540-29138-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Biswajit Nandy, Nabil Seddigh, Peter Pieda, Jeremy Ethridge |
Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, Paris, France, May 14-19, 2000, Proceedings, pp. 540-554, 2000, Springer, 3-540-67506-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Wei Lin, Rong Zheng 0001, Jennifer C. Hou |
How to Make Assured Service More Assured. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Seventh Annual International Conference on Network Protocols, ICNP 1999, 31 October - 3 November, 1999, Toronto, Canada, Proceedings, pp. 182-, 1999, IEEE Computer Society, 0-7695-0412-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
queue management mechanisms, profilers, Differentiated services |
25 | Nicole K. Laprise, Richard Hanusik, T. J. FitzGerald, Nancy Rosen, Keith S. White |
Developing a Multi-Institutional PACS Archive and Designing Processes to Manage the Shift from a Film to a Digital-Based Archive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 15-24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
workflow, PACS, quality assurance, archive, digital imaging, digital imaging and communications in medicine (DICOM), clinical trial, radiotherapy, digital image management |
25 | Niklas Blum, Piotr Jacak, Florian Schreiner 0001, Dragos Vingarzan, Peter Weik |
Towards Standardized and Automated Fault Management and Service Provisioning for NGNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 16(1), pp. 63-91, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
New Generation Operations Systems and Software, Service fulfillment, Service assurance, Service Oriented Architectures, IP Multimedia Subsystem, Service provisioning |
25 | Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss |
Implementing middleware for content filtering and information flow control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 47-53, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GIOP, MILS, security, CORBA, safety, MLS, common criteria, high assurance, guards, IIOP |
|
|