


default search action
8. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: Orlando, FL, USA
- Belur V. Dasarathy:

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006. SPIE Proceedings 6241, SPIE 2006, ISBN 978-0-8194-6297-8
Data Mining
- Robert S. Lynch Jr., Peter K. Willett

:
An algorithmic approach to mining unknown clusters in training data. 624101 - Shuxin Li, Robert Lee, Sheau-Dong Lang:

Efficient mining of strongly correlated item pairs. 624102 - James F. Smith III, ThanhVu H. Nguyen:

Genetic program based data mining to reverse engineer digital logic. 624103 - A. K. Checker, R. Appavu Raj:

Database architecture for data mining to aid real-time range safety decision in a test range. 624104 - Yiyu Yao

:
Granular computing for data mining. 624105
Information Assurance and Security
- William G. Perry:

How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains. 624106 - Martin R. Stytz, Sheila B. Banks:

Personal privacy, information assurance, and the threat posed by malware techology. 624107 - Suat Özdemir

:
Energy efficient link layer security solution for wireless LANs. 624108 - Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann:

Image sensor for security applications with on-chip data authentication. 624109 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:

Mining security events in a distributed agent society. 62410A
Intrusion Detection
- Jidong Long, Daniel G. Schwartz, Sara Stoecklin:

Distinguishing false from true alerts in Snort by data mining patterns of alerts. 62410B - Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung:

A novel interacting multiple model based network intrusion detection scheme. 62410C - Jesús González-Pino, Janica Edmonds, Mauricio Papa

:
Attribute selection using information gain for a fuzzy logic intrusion detection system. 62410D - Vladimir Nikulin:

Threshold-based clustering for intrusion detection systems. 62410E - Peili Qiao, Jie Su, Yahui Liu:

Distributed intrusion detection system based on fuzzy rules. 62410F
Internet Applications
- Boris A. Galitsky

, Boris Kovalerchuk
:
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. 62410G - Raymond A. Cardillo, John J. Salerno:

Detecting people of interest from internet data sources. 62410H - Jingtao Yao, Wei-Ning Liu:

Web-based dynamic Delphi: a new survey instrument. 62410I - Vladimir Nikulin:

Dimensional reduction of web traffic data. 62410J
Miscellaneous Models and Applications
- Qiwei Lin, Gui Feng:

A novel mark embedding and attack identifying technique for watermarking. 62410K - Alexander Ekimov, James M. Sabatier:

Broad frequency acoustic response of ground/floor to human footsteps. 62410L - Jason Hester, William Yurcik, Roy H. Campbell:

An implementation-independent threat model for group communications. 62410M - Maxwell G. Dondo, Nathalie Japkowicz

, Reuben Smith:
AutoCorrel: a neural network event correlation approach. 62410N - Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin:

Data modeling for predictive behavior hypothesis formation and testing. 62410P
Intrusion Detection and Network Security
- Kevin J. Kumpf:

End-to-end communications security. 62410R - Matheos Kazantzidis:

Extending key sharing: how to generate a key tightly coupled to a network security policy. 62410S - Wenbin Qiu, Yu Wu, Guoyin Wang

, Simon X. Yang
, Jie Bai, Jieying Li:
A novel unsupervised anomaly detection based on robust principal component classifier. 62410T - Qiao Yan, Jianping Yu:

AINIDS: an immune-based network intrusion detection system. 62410U
Data Mining Algorithms and Applications
- Tong Wang, Daxin Liu, Xuan-Zuo Lin, Wei Sun:

Clustering method via independent components for semi-structured documents. 62410V - Shusaku Tsumoto, Yuko Tsumoto:

Mining hospital management data. 62410W - Shusaku Tsumoto:

Visualization of similarities and dissimilarities in rules using MDS. 62410X - Thomas G. L. Allen:

Damage assessment of mission essential buildings based on simulation studies of low yield explosives. 62410Y
Poster Session
- Vladimir G. Krasilenko

, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev
, Konstantin V. Ogorodnik
:
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. 62410Z - Lijuan Zhou, Chi Liu, Chunying Wang:

The design and application of data warehouse during modern enterprises environment. 624110 - Mark Lodato, Ismail Jouny:

A practical timing attack on RSA over a LAN. 624111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














