|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3691 occurrences of 1860 keywords
|
|
|
Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | André Grégio, Rafael D. C. Santos, Antonio Montes |
Evaluation of data mining techniques for suspicious network activity classification using honeypots data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ting Wei, Yu Wu, Yinguo Li |
A flexible self-learning model based on granular computing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Brian Ulicny, Ken Baclawski, Amy L. Magnus |
New metrics for blog mining. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati, Denis Grishin |
Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vijay P. Shah, Nicolas H. Younan, Surya S. Durbha, Roger L. King |
Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Maxwell G. Dondo, Peter Mason, Nathalie Japkowicz, Reuben Smith |
AutoCorrel II: a neural network event correlation approach. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Basabdatta Sen Bhattacharya, Stephen B. Furber |
Maximising information recovery from rank-order codes. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Cluster analysis of temporal trajectories of hospital laboratory examinations. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, N. Balakrishnan 0001 |
Selection of intrusion detection system threshold bounds for effective sensor fusion. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jing Hu, Jianbo Gao, Nageswara S. V. Rao |
Defending against Internet worms using a phase space method from chaos theory. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Zhongxiao Hao, Chi Liu |
Selecting materialized views using random algorithm. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Mining unknown patterns in data when the features are correlated. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Anca Doloc-Mihu, Vijay V. Raghavan 0001 |
Three-way aspect model (TWAPM) and co-training for image retrieval. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Enabling distributed simulation multilevel security using virtual machine and virtual private network technology. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Robert J. Holt, Hong Man, Rainer Martini, Iraban Mukherjee, Ravi Netravali, Jing Wang |
Summary of results on optimal camera placement for boundary monitoring. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Dong Won Kim, Joseph P. Herbert |
Supporting online learning with games. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006 |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP BibTeX RDF |
|
27 | Shuxin Li, Robert Lee, Sheau-Dong Lang |
Efficient mining of strongly correlated item pairs. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jesús González-Pino, Janica Edmonds, Mauricio Papa |
Attribute selection using information gain for a fuzzy logic intrusion detection system. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Wei-Ning Liu |
Web-based dynamic Delphi: a new survey instrument. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mark Lodato, Ismail Jouny |
A practical timing attack on RSA over a LAN. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Thomas G. L. Allen |
Damage assessment of mission essential buildings based on simulation studies of low yield explosives. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Chi Liu, Chunying Wang |
The design and application of data warehouse during modern enterprises environment. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir Nikulin |
Threshold-based clustering for intrusion detection systems. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann |
Image sensor for security applications with on-chip data authentication. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jason Hester, William Yurcik, Roy H. Campbell |
An implementation-independent threat model for group communications. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Kevin J. Kumpf |
End-to-end communications security. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yiyu Yao |
Granular computing for data mining. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Tong Wang 0005, Daxin Liu 0001, Xuan-Zuo Lin, Wei Sun 0005 |
Clustering method via independent components for semi-structured documents. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qiao Yan, Jianping Yu |
AINIDS: an immune-based network intrusion detection system. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qiwei Lin, Gui Feng |
A novel mark embedding and attack identifying technique for watermarking. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Ekimov, James M. Sabatier |
Broad frequency acoustic response of ground/floor to human footsteps. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Boris A. Galitsky, Boris Kovalerchuk |
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Genetic program based data mining to reverse engineer digital logic. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Suat Özdemir |
Energy efficient link layer security solution for wireless LANs. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir G. Krasilenko, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev, Konstantin V. Ogorodnik |
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
An algorithmic approach to mining unknown clusters in training data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto |
Visualization of similarities and dissimilarities in rules using MDS. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Yuko Tsumoto |
Mining hospital management data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Jie Su, Yahui Liu |
Distributed intrusion detection system based on fuzzy rules. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Wenbin Qiu, Yu Wu 0001, Guoyin Wang 0001, Simon X. Yang, Jie Bai, Jieying Li |
A novel unsupervised anomaly detection based on robust principal component classifier. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran |
Mining security events in a distributed agent society. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Raymond A. Cardillo, John J. Salerno |
Detecting people of interest from internet data sources. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Vladimir Nikulin |
Dimensional reduction of web traffic data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Matheos Kazantzidis |
Extending key sharing: how to generate a key tightly coupled to a network security policy. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin |
Data modeling for predictive behavior hypothesis formation and testing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jidong Long, Daniel G. Schwartz, Sara Stoecklin |
Distinguishing false from true alerts in Snort by data mining patterns of alerts. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | A. K. Checker, R. Appavu Raj |
Database architecture for data mining to aid real-time range safety decision in a test range. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung |
A novel interacting multiple model based network intrusion detection scheme. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Maxwell G. Dondo, Nathalie Japkowicz, Reuben Smith |
AutoCorrel: a neural network event correlation approach. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005 |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP BibTeX RDF |
|
27 | Vladimir Nikulin, Alexander J. Smola |
Parametric model-based clustering. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Abdelghani Bellaachia, Rajat Bhatt |
An enhanced stream mining approach for network anomaly detection. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal |
VMSoar: a cognitive agent for network security. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yongjun Hai, Yu Wu 0001, Guoyin Wang 0001 |
An improved unsupervised clustering-based intrusion detection method. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin |
Shai-Hulud: The quest for worm sign. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Chandra Pandey |
Deducing trapdoor primitives in public key encryption schemes. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Danzhou Liu, Charles E. Hughes |
Deducing behaviors from primitive movement attributes. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dongming Cai, James Theiler, Maya B. Gokhale |
Detecting a malicious executable without prior knowledge of its patterns. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001 |
Knowledge extracted from trained neural networks: What's next? |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rodolfo A. Fiorini, Gianfranco Dacquino |
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Shoji Hirano |
On statistical independence of a contingency matrix. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Kun Zhang 0012, Zujia Xu, Bill P. Buckles |
Oblique decision tree induction using multimembered evolution strategies. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Wei Xie, Feng Chu 0002, Lipo Wang, Eng Thiam Lim |
A fuzzy neural network for intelligent data processing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran |
Efficient visualization of security events in a large agent society. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Raymond A. Cardillo, John J. Salerno |
The pearls of using real-world evidence to discover social groups. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Qiang Wang 0010, Vasileios Megalooikonomou |
A clustering algorithm for intrusion detection. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jingtao Yao 0001, Songlun Zhao, Lawrence V. Saxton |
A study on fuzzy intrusion detection. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Moises Sudit, Adam Stotz, Michael Holender |
Situational awareness of a coordinated cyber attack. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yu Liu, Hong Man |
Network vulnerability assessment using Bayesian networks. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Predrag Zivic |
Information risk and security modeling. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang |
Comparing various algorithms for discovering social groups with uni-party data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto |
Granularity and statistical independence in a contingency table. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Deyun Chen, Shujun Pei, Zhiying Quan |
Knowledge base system visualization reasoning model based on ICON. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Ching-Cheng Lee, Rashmi Prabhakara |
Web image retrieval using an effective topic and content-based technique. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma |
Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Classification of temporal sequences using multiscale matching and rough clustering. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | David P. Benjamin, Adrian Walker |
Semantic encoding of relational databases in wireless networks. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Vivek Verma, Nikhil Gagvani |
Visualizing intelligence information using correlation graphs. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yaping Deng, Wei Zhang |
A new method for MPLS-based recovery. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | James F. Smith III, ThanhVu H. Nguyen |
Data-mining-based automated reverse engineering and defect discovery. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Jie Su, Chengwei Sun |
Distributed intrusion detection system based on ARTIS. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rashid Hafeez Khokhar, Mohd. Noor Md. Sap |
Predictive fuzzy reasoning method for time series stock market data mining. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Yao Li 0002, Zhitang Li, Hao Tu |
Dynamic immune intrusion detection system for IPv6. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Sheila B. Banks, Martin R. Stytz |
A taxonomy and discussion of software attack technologies. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Tansel Özyer, Reda Alhajj, Ken Barker 0001 |
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Mian Zhou, Sheau-Dong Lang |
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali |
Remote Attestation of Attribute Updates and Information Flows in a UCON System. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
security, Information flow, usage control, remote attestation |
26 | John Lloyd, Jan Jürjens |
Security Analysis of a Biometric Authentication System Using UMLsec and JML. |
MoDELS |
2009 |
DBLP DOI BibTeX RDF |
UMLsec, Security analysis, biometric authentication, JML |
26 | Heather Goldsby, Betty H. C. Cheng, Ji Zhang |
AMOEBA-RT: Run-Time Verification of Adaptive Software. |
MoDELS (Workshops) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Alec Yasinsac, Mike Burmester |
Centers of Academic Excellence: A Case Study. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
Florida State University, scholarship programs |
26 | Ewen Denney, Bernd Fischer 0002 |
Certifiable Program Generation. |
GPCE |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Biswajit Nandy, Nabil Seddigh, Peter Pieda, Jeremy Ethridge |
Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks. |
NETWORKING |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Wei Lin, Rong Zheng 0001, Jennifer C. Hou |
How to Make Assured Service More Assured. |
ICNP |
1999 |
DBLP DOI BibTeX RDF |
queue management mechanisms, profilers, Differentiated services |
25 | Nicole K. Laprise, Richard Hanusik, T. J. FitzGerald, Nancy Rosen, Keith S. White |
Developing a Multi-Institutional PACS Archive and Designing Processes to Manage the Shift from a Film to a Digital-Based Archive. |
J. Digit. Imaging |
2009 |
DBLP DOI BibTeX RDF |
workflow, PACS, quality assurance, archive, digital imaging, digital imaging and communications in medicine (DICOM), clinical trial, radiotherapy, digital image management |
25 | Niklas Blum, Piotr Jacak, Florian Schreiner 0001, Dragos Vingarzan, Peter Weik |
Towards Standardized and Automated Fault Management and Service Provisioning for NGNs. |
J. Netw. Syst. Manag. |
2008 |
DBLP DOI BibTeX RDF |
New Generation Operations Systems and Software, Service fulfillment, Service assurance, Service Oriented Architectures, IP Multimedia Subsystem, Service provisioning |
25 | Jeffrey Choi Robinson, W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss |
Implementing middleware for content filtering and information flow control. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
GIOP, MILS, security, CORBA, safety, MLS, common criteria, high assurance, guards, IIOP |
|
|