


default search action
7. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: Orlando, FL, USA
- Belur V. Dasarathy:

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005. SPIE Proceedings 5812, SPIE 2005, ISBN 978-0-81945797-4
Intrusion Detection Tools
- Dongming Cai, James Theiler, Maya B. Gokhale:

Detecting a malicious executable without prior knowledge of its patterns. 1-12 - Tansel Özyer, Reda Alhajj, Ken Barker:

Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. 13-22 - Jingtao Yao, Songlun Zhao, Lawrence V. Saxton:

A study on fuzzy intrusion detection. 23-30 - Qiang Wang, Vasileios Megalooikonomou:

A clustering algorithm for intrusion detection. 31-38 - Mian Zhou, Sheau-Dong Lang:

Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. 39-51 - Yongjun Hai, Yu Wu, Guoyin Wang

:
An improved unsupervised clustering-based intrusion detection method. 52-60
Vulnerability Assessment and Network Security
- Yu Liu, Hong Man:

Network vulnerability assessment using Bayesian networks. 61-71 - David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal:

VMSoar: a cognitive agent for network security. 72-80 - Chandra Pandey:

Deducing trapdoor primitives in public key encryption schemes. 81-91
Security Issues
- Sheila B. Banks, Martin R. Stytz:

A taxonomy and discussion of software attack technologies. 92-101 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:

Efficient visualization of security events in a large agent society. 102-113 - Moises Sudit, Adam Stotz, Michael Holender:

Situational awareness of a coordinated cyber attack. 114-129 - Martin R. Stytz, Sheila B. Banks:

Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. 130-141 - Predrag Zivic:

Information risk and security modeling. 142-150 - Jingtao Yao:

Knowledge extracted from trained neural networks: What's next? 151-157
Learning, Classification, and Clustering
- Robert S. Lynch Jr., Peter K. Willett

:
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. 158-167 - John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang:

Comparing various algorithms for discovering social groups with uni-party data. 168-179 - Danzhou Liu, Charles E. Hughes

:
Deducing behaviors from primitive movement attributes. 180-189 - Vladimir Nikulin, Alexander J. Smola:

Parametric model-based clustering. 190-201 - Shoji Hirano, Shusaku Tsumoto:

Classification of temporal sequences using multiscale matching and rough clustering. 202-213 - Rodolfo A. Fiorini

, Gianfranco Dacquino:
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. 214-225
Applications
- Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma:

Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. 226-231 - James F. Smith III, ThanhVu H. Nguyen:

Data-mining-based automated reverse engineering and defect discovery. 232-242 - Rashid Hafeez Khokhar, Mohd. Noor Md. Sap:

Predictive fuzzy reasoning method for time series stock market data mining. 243-254
Miscellaneous Tools
- David P. Benjamin, Adrian Walker:

Semantic encoding of relational databases in wireless networks. 255-262 - Kun Zhang, Zujia Xu, Bill P. Buckles:

Oblique decision tree induction using multimembered evolution strategies. 263-270 - Vivek Verma, Nikhil Gagvani:

Visualizing intelligence information using correlation graphs. 271-282 - Wei Xie, Feng Chu, Lipo Wang

, Eng Thiam Lim:
A fuzzy neural network for intelligent data processing. 283-290 - Shusaku Tsumoto, Shoji Hirano:

On statistical independence of a contingency matrix. 291-302 - Ching-Cheng Lee, Rashmi Prabhakara:

Web image retrieval using an effective topic and content-based technique. 303-308
Miscellaneous Topics
- Raymond A. Cardillo, John J. Salerno:

The pearls of using real-world evidence to discover social groups. 309-320 - Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin:

Shai-Hulud: The quest for worm sign. 321-329 - Shusaku Tsumoto:

Granularity and statistical independence in a contingency table. 330-341 - Abdelghani Bellaachia, Rajat Bhatt:

An enhanced stream mining approach for network anomaly detection. 342-351
Poster Session
- Deyun Chen, Shujun Pei, Zhiying Quan:

Knowledge base system visualization reasoning model based on ICON. 352-355 - Peili Qiao, Jie Su, Chengwei Sun:

Distributed intrusion detection system based on ARTIS. 356-363 - Yaping Deng, Wei Zhang:

A new method for MPLS-based recovery. 364-373 - Yao Li, Zhitang Li, Hao Tu:

Dynamic immune intrusion detection system for IPv6. 374-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














