default search action
10. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: Orlando, FL, USA
- Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008. SPIE Proceedings 6973, SPIE 2008, ISBN 978-0-8194-7164-2
Information Assurance and Security
- George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel:
Integrated mandatory access control for digital data. 697302 - Martin R. Stytz, Sheila B. Banks:
Addressing security issues related to virtual institute distributed activities. 697303 - Thomas G. L. Allen:
An innovative middle tier design for protecting federal privacy act data. 697304 - Sheela V. Belur, Jonathan Gloster:
Mathematical model for security effectiveness figure of merit and its optimization. 697305 - Jie Su, Yahui Liu:
Distributed intrusion detection system based on grid security model. 697306
Data Mining
- Jim Brander, Alex Lupu:
Is mining of knowledge possible? 697307 - Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama:
Application of data mining to medical risk management. 697308 - Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis:
A data mining approach to intelligence operations. 697309 - Doracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias:
The epidemic threshold theorem with social and contact heterogeneity. 69730A - Lili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu:
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing. 69730B
Intrusion Detection
- Gilbert Hendry, Shanchieh Jay Yang:
Intrusion signature creation via clustering anomalies. 69730C - Marco Carvalho, Richard Ford, William H. Allen, Gerald A. Marin:
Securing MANETs with BITSI: danger theory and mission continuity. 69730D - Jared Holsopple, Shanchieh Jay Yang, Brian Argauer:
Virtual terrain: a security-based representation of a computer network. 69730E - Brian Argauer, Shanchieh Jay Yang:
VTAC: virtual terrain assisted impact assessment for cyber attacks. 69730F - Ciza Thomas, Vishwas Sharma, N. Balakrishnan:
Usefulness of DARPA dataset for intrusion detection system evaluation. 69730G
Miscellaneous Topics
- Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr.:
Performance comparison of the automatic data reduction system (ADRS). 69730H - Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead:
Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement. 69730I - Vahid R. Riasati:
Adaptive Markov feature estimation and categorization using the projection-slice theorem. 69730J
Miscellaneous Applications
- Tao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi:
A new approach to chemical agent detection, classification, and estimation. 69730K - Sajid Hussain, Richard Peters, Daniel L. Silver:
Using received signal strength variation for surveillance in residential areas. 69730L - Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead:
Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition. 69730M - Ciza Thomas, N. Balakrishnan:
Improvement in minority attack detection with skewness in network traffic. 69730N
Poster Session
- Peili Qiao, Tong Wang, Jie Su:
An improved clone selection immune algorithm. 69730O - Peili Qiao, Tong Wang, Jie Su:
An immunity-based model for dynamic distributed intrusion detection. 69730P - Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao:
Research on parallel algorithm for sequential pattern mining. 69730Q
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.