The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assurance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1978 (19) 1979-1982 (15) 1983-1985 (15) 1986 (17) 1987-1988 (23) 1989-1990 (19) 1991-1992 (25) 1993 (27) 1994 (27) 1995 (26) 1996 (67) 1997 (74) 1998 (71) 1999 (103) 2000 (128) 2001 (150) 2002 (164) 2003 (244) 2004 (279) 2005 (441) 2006 (350) 2007 (486) 2008 (473) 2009 (725) 2010 (339) 2011 (752) 2012 (219) 2013 (199) 2014 (258) 2015 (296) 2016 (286) 2017 (243) 2018 (239) 2019 (263) 2020 (244) 2021 (211) 2022 (241) 2023 (276) 2024 (58)
Publication types (Num. hits)
article(1531) book(16) incollection(476) inproceedings(5893) phdthesis(94) proceedings(82)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3691 occurrences of 1860 keywords

Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27André Grégio, Rafael D. C. Santos, Antonio Montes Evaluation of data mining techniques for suspicious network activity classification using honeypots data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ting Wei, Yu Wu, Yinguo Li A flexible self-learning model based on granular computing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Brian Ulicny, Ken Baclawski, Amy L. Magnus New metrics for blog mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Vahid R. Riasati, Denis Grishin Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Vijay P. Shah, Nicolas H. Younan, Surya S. Durbha, Roger L. King Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Maxwell G. Dondo, Peter Mason, Nathalie Japkowicz, Reuben Smith AutoCorrel II: a neural network event correlation approach. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Basabdatta Sen Bhattacharya, Stephen B. Furber Maximising information recovery from rank-order codes. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Shoji Hirano, Shusaku Tsumoto Cluster analysis of temporal trajectories of hospital laboratory examinations. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ciza Thomas, N. Balakrishnan 0001 Selection of intrusion detection system threshold bounds for effective sensor fusion. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Jing Hu, Jianbo Gao, Nageswara S. V. Rao Defending against Internet worms using a phase space method from chaos theory. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27James F. Smith III, ThanhVu H. Nguyen Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Lijuan Zhou, Zhongxiao Hao, Chi Liu Selecting materialized views using random algorithm. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Robert S. Lynch Jr., Peter K. Willett Mining unknown patterns in data when the features are correlated. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Anca Doloc-Mihu, Vijay V. Raghavan 0001 Three-way aspect model (TWAPM) and co-training for image retrieval. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Martin R. Stytz, Sheila B. Banks Enabling distributed simulation multilevel security using virtual machine and virtual private network technology. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Robert J. Holt, Hong Man, Rainer Martini, Iraban Mukherjee, Ravi Netravali, Jing Wang Summary of results on optimal camera placement for boundary monitoring. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Jingtao Yao 0001, Dong Won Kim, Joseph P. Herbert Supporting online learning with games. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Belur V. Dasarathy (eds.) Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006 Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  BibTeX  RDF
27Shuxin Li, Robert Lee, Sheau-Dong Lang Efficient mining of strongly correlated item pairs. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jesús González-Pino, Janica Edmonds, Mauricio Papa Attribute selection using information gain for a fuzzy logic intrusion detection system. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jingtao Yao 0001, Wei-Ning Liu Web-based dynamic Delphi: a new survey instrument. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Mark Lodato, Ismail Jouny A practical timing attack on RSA over a LAN. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Thomas G. L. Allen Damage assessment of mission essential buildings based on simulation studies of low yield explosives. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Lijuan Zhou, Chi Liu, Chunying Wang The design and application of data warehouse during modern enterprises environment. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Vladimir Nikulin Threshold-based clustering for intrusion detection systems. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann Image sensor for security applications with on-chip data authentication. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jason Hester, William Yurcik, Roy H. Campbell An implementation-independent threat model for group communications. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Kevin J. Kumpf End-to-end communications security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yiyu Yao Granular computing for data mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Tong Wang 0005, Daxin Liu 0001, Xuan-Zuo Lin, Wei Sun 0005 Clustering method via independent components for semi-structured documents. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Qiao Yan, Jianping Yu AINIDS: an immune-based network intrusion detection system. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Qiwei Lin, Gui Feng A novel mark embedding and attack identifying technique for watermarking. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Alexander Ekimov, James M. Sabatier Broad frequency acoustic response of ground/floor to human footsteps. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Boris A. Galitsky, Boris Kovalerchuk Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27James F. Smith III, ThanhVu H. Nguyen Genetic program based data mining to reverse engineer digital logic. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Suat Özdemir Energy efficient link layer security solution for wireless LANs. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Vladimir G. Krasilenko, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev, Konstantin V. Ogorodnik A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Robert S. Lynch Jr., Peter K. Willett An algorithmic approach to mining unknown clusters in training data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Shusaku Tsumoto Visualization of similarities and dissimilarities in rules using MDS. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Shusaku Tsumoto, Yuko Tsumoto Mining hospital management data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Peili Qiao, Jie Su, Yahui Liu Distributed intrusion detection system based on fuzzy rules. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Wenbin Qiu, Yu Wu 0001, Guoyin Wang 0001, Simon X. Yang, Jie Bai, Jieying Li A novel unsupervised anomaly detection based on robust principal component classifier. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran Mining security events in a distributed agent society. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Raymond A. Cardillo, John J. Salerno Detecting people of interest from internet data sources. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Vladimir Nikulin Dimensional reduction of web traffic data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Matheos Kazantzidis Extending key sharing: how to generate a key tightly coupled to a network security policy. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin Data modeling for predictive behavior hypothesis formation and testing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jidong Long, Daniel G. Schwartz, Sara Stoecklin Distinguishing false from true alerts in Snort by data mining patterns of alerts. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27A. K. Checker, R. Appavu Raj Database architecture for data mining to aid real-time range safety decision in a test range. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung A novel interacting multiple model based network intrusion detection scheme. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Maxwell G. Dondo, Nathalie Japkowicz, Reuben Smith AutoCorrel: a neural network event correlation approach. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Belur V. Dasarathy (eds.) Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005 Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  BibTeX  RDF
27Vladimir Nikulin, Alexander J. Smola Parametric model-based clustering. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Abdelghani Bellaachia, Rajat Bhatt An enhanced stream mining approach for network anomaly detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Robert S. Lynch Jr., Peter K. Willett Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal VMSoar: a cognitive agent for network security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yongjun Hai, Yu Wu 0001, Guoyin Wang 0001 An improved unsupervised clustering-based intrusion detection method. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin Shai-Hulud: The quest for worm sign. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Chandra Pandey Deducing trapdoor primitives in public key encryption schemes. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Danzhou Liu, Charles E. Hughes Deducing behaviors from primitive movement attributes. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Dongming Cai, James Theiler, Maya B. Gokhale Detecting a malicious executable without prior knowledge of its patterns. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jingtao Yao 0001 Knowledge extracted from trained neural networks: What's next? Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Rodolfo A. Fiorini, Gianfranco Dacquino Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Shusaku Tsumoto, Shoji Hirano On statistical independence of a contingency matrix. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Kun Zhang 0012, Zujia Xu, Bill P. Buckles Oblique decision tree induction using multimembered evolution strategies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Wei Xie, Feng Chu 0002, Lipo Wang, Eng Thiam Lim A fuzzy neural network for intelligent data processing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran Efficient visualization of security events in a large agent society. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Raymond A. Cardillo, John J. Salerno The pearls of using real-world evidence to discover social groups. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Qiang Wang 0010, Vasileios Megalooikonomou A clustering algorithm for intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jingtao Yao 0001, Songlun Zhao, Lawrence V. Saxton A study on fuzzy intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Moises Sudit, Adam Stotz, Michael Holender Situational awareness of a coordinated cyber attack. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Martin R. Stytz, Sheila B. Banks Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yu Liu, Hong Man Network vulnerability assessment using Bayesian networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Predrag Zivic Information risk and security modeling. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang Comparing various algorithms for discovering social groups with uni-party data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Shusaku Tsumoto Granularity and statistical independence in a contingency table. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Deyun Chen, Shujun Pei, Zhiying Quan Knowledge base system visualization reasoning model based on ICON. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ching-Cheng Lee, Rashmi Prabhakara Web image retrieval using an effective topic and content-based technique. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Shoji Hirano, Shusaku Tsumoto Classification of temporal sequences using multiscale matching and rough clustering. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27David P. Benjamin, Adrian Walker Semantic encoding of relational databases in wireless networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Vivek Verma, Nikhil Gagvani Visualizing intelligence information using correlation graphs. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yaping Deng, Wei Zhang A new method for MPLS-based recovery. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27James F. Smith III, ThanhVu H. Nguyen Data-mining-based automated reverse engineering and defect discovery. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Peili Qiao, Jie Su, Chengwei Sun Distributed intrusion detection system based on ARTIS. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Rashid Hafeez Khokhar, Mohd. Noor Md. Sap Predictive fuzzy reasoning method for time series stock market data mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yao Li 0002, Zhitang Li, Hao Tu Dynamic immune intrusion detection system for IPv6. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Sheila B. Banks, Martin R. Stytz A taxonomy and discussion of software attack technologies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Tansel Özyer, Reda Alhajj, Ken Barker 0001 Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Mian Zhou, Sheau-Dong Lang Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali Remote Attestation of Attribute Updates and Information Flows in a UCON System. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, Information flow, usage control, remote attestation
26John Lloyd, Jan Jürjens Security Analysis of a Biometric Authentication System Using UMLsec and JML. Search on Bibsonomy MoDELS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF UMLsec, Security analysis, biometric authentication, JML
26Heather Goldsby, Betty H. C. Cheng, Ji Zhang AMOEBA-RT: Run-Time Verification of Adaptive Software. Search on Bibsonomy MoDELS (Workshops) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Alec Yasinsac, Mike Burmester Centers of Academic Excellence: A Case Study. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Florida State University, scholarship programs
26Ewen Denney, Bernd Fischer 0002 Certifiable Program Generation. Search on Bibsonomy GPCE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Biswajit Nandy, Nabil Seddigh, Peter Pieda, Jeremy Ethridge Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks. Search on Bibsonomy NETWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Wei Lin, Rong Zheng 0001, Jennifer C. Hou How to Make Assured Service More Assured. Search on Bibsonomy ICNP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF queue management mechanisms, profilers, Differentiated services
25Nicole K. Laprise, Richard Hanusik, T. J. FitzGerald, Nancy Rosen, Keith S. White Developing a Multi-Institutional PACS Archive and Designing Processes to Manage the Shift from a Film to a Digital-Based Archive. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2009 DBLP  DOI  BibTeX  RDF workflow, PACS, quality assurance, archive, digital imaging, digital imaging and communications in medicine (DICOM), clinical trial, radiotherapy, digital image management
25Niklas Blum, Piotr Jacak, Florian Schreiner 0001, Dragos Vingarzan, Peter Weik Towards Standardized and Automated Fault Management and Service Provisioning for NGNs. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF New Generation Operations Systems and Software, Service fulfillment, Service assurance, Service Oriented Architectures, IP Multimedia Subsystem, Service provisioning
25Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss Implementing middleware for content filtering and information flow control. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GIOP, MILS, security, CORBA, safety, MLS, common criteria, high assurance, guards, IIOP
Displaying result #701 - #800 of 8092 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license