|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3691 occurrences of 1860 keywords
|
|
|
Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Michael Losavio, Adel Elmaghraby, Deborah W. Keeling |
International Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Javek Ikbal |
Cryptography. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Brian T. Geffert |
Health Insurance Portability and Accountability Act (HIPAA): Security Requirements. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Sean Scanlon |
Application Security: World Wide Web. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Glenn Cater |
Event Management. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey Davis |
Corporate Security: IT Organization. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Kate Borten |
Privacy: Healthcare Industry. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bonnie A. Goins Pilewski |
Critical Business Functions. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Daniel D. Houser |
Passwords and Policy Threat Analysis. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Robby Fussell |
Next-Generation Security Application Development. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Lynda L. McGhie |
Web Services. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Ed Skoudis |
Open Source. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Mostafa Sedighizadeh, Alireza Rezazadeh |
Adaptive Self-Tuning Wavelet Neural Network Controller for a Proton Exchange Membrane Fuel Cell. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Anuradha M. Annaswamy, Jinho Jang, Eugene Lavretsky |
Robust Adaptive Control Revisited: Semi-global Boundedness and Margins. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Ali Reza Mehrabian, Mohammad Bagher Menhaj |
Stick-Slip Friction Compensation Using a General Purpose Neuro-Adaptive Controller with Guaranteed Stability. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Nhan T. Nguyen, Stephen A. Jacklin |
Stability, Convergence, and Verification and Validation Challenges of Neural Net Adaptive Flight Control. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Y. D. Song, Liguo Weng, Medorian D. Gheorghiu |
Pitch-Depth Control of Submarine Operating in Shallow Water via Neuro-adaptive Approach. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Sampath Yerramalla, Edgar Fuller, Bojan Cukic |
Dynamic Allocation in Neural Networks for Adaptive Controllers. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Helen Yu |
Network Complexity Analysis of Multilayer Feedforward Artificial Neural Networks. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Tim Smith, Jim Barhorst, James M. Urnes |
Design and Flight Test of an Intelligent Flight Control System. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Xiaoou Li, Wen Yu 0001 |
Modeling of Crude Oil Blending via Discrete-Time Neural Networks. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Dragan Djurdjanovic, Jianbo Liu, Kenneth A. Marko, Jun Ni 0002 |
Immune Systems Inspired Approach to Anomaly Detection, Fault Localization and Diagnosis in Automotive Engines. |
Applications of Neural Networks in High Assurance Systems |
2010 |
DBLP DOI BibTeX RDF |
|
27 | David M. Russinoff |
A Mechanically Verified Commercial SRT Divider. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Anthony C. J. Fox, Michael J. C. Gordon, Magnus O. Myreen |
Specification and Verification of ARM Hardware and Software. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Konrad Slind, Guodong Li, Scott Owens |
Compiling Higher Order Logic by Proof. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Michael W. Whalen, David A. Greve, Lucas G. Wagner |
Model Checking Information Flow. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Warren A. Hunt Jr., Sol Swords, Jared Davis, Anna Slobodová |
Use of Formal Verification at Centaur Technology. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Raymond J. Richards |
Modeling and Security Analysis of a Commercial Real-Time Operating System Kernel. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Torben Amtoft, John Hatcliff, Edwin Rodríguez, Robby, Jonathan Hoag, David A. Greve |
Specification and Checking of Software Contracts for Conditional Information Flow. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Sally Browning, Philip Weaver |
Designing Tunable, Verifiable Cryptographic Hardware Using Cryptol. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Matthew Wilding, David A. Greve, Raymond J. Richards, David S. Hardin |
Formal Verification of Partition Management for the AAMP7G Microprocessor. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | David A. Greve |
Information Security Modeling and Analysis. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Gerwin Klein, Thomas Sewell, Simon Winwood |
Refinement in the Formal Verification of the seL4 Microkernel. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Panagiotis Manolios, Sudarshan K. Srinivasan |
Verifying Pipelines with BAT. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Matt Kaufmann, J Strother Moore |
ACL2 and Its Applications to Digital System Verification. |
Design and Verification of Microprocessor Systems for High-Assurance Applications |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan (eds.) |
Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009 |
Classical and Quantum Information Assurance Foundations and Practice |
2009 |
DBLP BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP BibTeX RDF |
|
27 | Dusko Pavlovic |
Geometry of abstraction in quantum computation. |
Classical and Quantum Information Assurance Foundations and Practice |
2009 |
DBLP BibTeX RDF |
|
27 | Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Salvail, Michel Riguidel, Andrew J. Shields, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John G. Rarity, Harald Weinfurter, Anton Zeilinger, Christian Monyk |
Quantum key distribution and cryptography: a survey. |
Classical and Quantum Information Assurance Foundations and Practice |
2009 |
DBLP BibTeX RDF |
|
27 | Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen |
Security in MANETs using reputation-adjusted routing. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Richard J. Hummel, Errin W. Fulp |
High-speed packet filtering utilizing stream processors. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jieyan Fan, Dapeng Wu 0001, Antonio Nucci, Ram Keralapura, Lixin Gao 0001 |
Identifying hidden voice and video streams. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hidenao Abe, Shusaku Tsumoto |
A method to characterize dataset based on objective rule evaluation indices. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Min Xu, Zhang Zhang, Luping Duan |
Classification data mining method based on dynamic RBF neural networks. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Alejandra López-Caloca, Elvia Martínez-Viveros, José Ignacio Chapela-Castañares |
Application of a clustering-remote sensing method in analyzing security patterns. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Munesh Kumar, Shoaib Siddique, Humera Noor |
Feature-based alert correlation in security systems using self organizing maps. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Wei Wang 0084, Hong Man |
Exploring social relations for the intrusion detection in ad hoc networks. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vimalathithan Subramanian, Sithu D. Sudarsan, Remzi Seker, Rathinasamy B. Lenin, Srinivasan Ramaswamy |
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jean Lancrenon, Roland Gillard, Thierry Fournel |
Remote object authentication: confidence model, cryptosystem and protocol. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shu-qing Peng, Huining Duan, Deyun Chen |
Design and implementation of workflow engine for service-oriented architecture. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shusaku Tsumoto, Shoji Hirano |
Temporal data mining for hospital management. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Minhua Wu, Shuang Li |
Design of data warehouse in teaching state based on OLAP and data mining. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati |
Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fields. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Robert S. Lynch Jr., Peter K. Willett |
Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classification. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Holger Jaenisch, James W. Handley, Nathaniel Albritton, David Whitener, Randel Burnett, Robert Caspers, Stephen Moren, Thomas Alexander, William Maddox III, William Albritton Jr. |
Autonomous journaling response using data model LUTS. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Peter Schallauer, Werner Bailer, Albert Hofmann, Roland Mörzinger |
SAM: an interoperable metadata model for multimodal surveillance applications. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Sajid Hussain, Md. Shafayat Rahman |
Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | André Ricardo Abed Grégio, Isabela L. Oliveira, Rafael D. C. Santos, Adriano M. Cansian, Paulo L. de Geus |
Malware distributed collection and pre-classification system using honeypot technology. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Considerations and foundations for Botnet simulation. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Alan Harris, Mouhamad K. Al Akkoumi, James J. Sluss Jr. |
A comparison of passive optical network security. |
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008 |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP BibTeX RDF |
|
27 | Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama |
Application of data mining to medical risk management. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Doracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias |
The epidemic threshold theorem with social and contact heterogeneity. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Martin R. Stytz, Sheila B. Banks |
Addressing security issues related to virtual institute distributed activities. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu |
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Vahid R. Riasati |
Adaptive Markov feature estimation and categorization using the projection-slice theorem. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gilbert Hendry, Shanchieh Jay Yang |
Intrusion signature creation via clustering anomalies. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sajid Hussain, Richard Peters, Daniel L. Silver |
Using received signal strength variation for surveillance in residential areas. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jie Su, Yahui Liu |
Distributed intrusion detection system based on grid security model. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jim Brander, Alex Lupu |
Is mining of knowledge possible? |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Thomas G. L. Allen |
An innovative middle tier design for protecting federal privacy act data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Tong Wang, Jie Su |
An improved clone selection immune algorithm. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Marco Carvalho 0001, Richard Ford, William H. Allen, Gerald A. Marin |
Securing MANETs with BITSI: danger theory and mission continuity. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Peili Qiao, Tong Wang, Jie Su |
An immunity-based model for dynamic distributed intrusion detection. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, Vishwas Sharma, N. Balakrishnan 0001 |
Usefulness of DARPA dataset for intrusion detection system evaluation. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr. |
Performance comparison of the automatic data reduction system (ADRS). |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ciza Thomas, N. Balakrishnan 0001 |
Improvement in minority attack detection with skewness in network traffic. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead |
Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Brian Argauer, Shanchieh Jay Yang |
VTAC: virtual terrain assisted impact assessment for cyber attacks. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead |
Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jared Holsopple, Shanchieh Jay Yang, Brian Argauer |
Virtual terrain: a security-based representation of a computer network. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis |
A data mining approach to intelligence operations. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao |
Research on parallel algorithm for sequential pattern mining. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sheela V. Belur, Jonathan Gloster |
Mathematical model for security effectiveness figure of merit and its optimization. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel |
Integrated mandatory access control for digital data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Tao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi |
A new approach to chemical agent detection, classification, and estimation. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Belur V. Dasarathy (eds.) |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007 |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP BibTeX RDF |
|
27 | Luc Longpré, Vladik Kreinovich |
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis |
Cryptography and Cryptanalysis Through Computational Intelligence. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ki-Won Yeom |
Immune-inspired Algorithm for Anomaly Detection. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne |
Fingerprint Recognition Using a Hierarchical Approach. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sangkyun Kim |
Governance of Information Security: New Paradigm of Security Management. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Paolo Mercorelli, Alexander Frick |
Industrial Applications Using Wavelet Packets for Gross Error Detection. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper |
Smart Card Security. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shiguo Lian |
Multimedia Content Protection Based on Chaotic Neural Networks. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nadia Nedjah, Luiza de Macedo Mourelle |
Evolutionary Regular Substitution Boxes. |
Computational Intelligence in Information Assurance and Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sheila B. Banks, Martin R. Stytz |
Bot armies as threats to network security. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shoji Hirano, Shusaku Tsumoto |
Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Kirk A. Dunkelberger |
Semantic search via concept annealing. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hongda Chen 0001, Genshe Chen, Erik Blasch, Martin Kruger, Irma Sityar |
Analysis and visualization of large complex attack graphs for networks security. |
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 8092 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|