![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2006
- Thomas G. L. Allen:
Damage assessment of mission essential buildings based on simulation studies of low yield explosives. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410Y - Raymond A. Cardillo, John J. Salerno:
Detecting people of interest from internet data sources. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410H - A. K. Checker, R. Appavu Raj:
Database architecture for data mining to aid real-time range safety decision in a test range. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624104 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:
Mining security events in a distributed agent society. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410A - Maxwell G. Dondo, Nathalie Japkowicz
, Reuben Smith:
AutoCorrel: a neural network event correlation approach. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410N - Alexander Ekimov, James M. Sabatier:
Broad frequency acoustic response of ground/floor to human footsteps. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410L - Boris A. Galitsky
, Boris Kovalerchuk
:
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410G - Jesús González-Pino, Janica Edmonds, Mauricio Papa
:
Attribute selection using information gain for a fuzzy logic intrusion detection system. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410D - Jason Hester, William Yurcik, Roy H. Campbell:
An implementation-independent threat model for group communications. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410M - Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin:
Data modeling for predictive behavior hypothesis formation and testing. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410P - Matheos Kazantzidis:
Extending key sharing: how to generate a key tightly coupled to a network security policy. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410S - Vladimir G. Krasilenko
, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev
, Konstantin V. Ogorodnik
:
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410Z - Kevin J. Kumpf:
End-to-end communications security. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410R - Shuxin Li, Robert Lee, Sheau-Dong Lang:
Efficient mining of strongly correlated item pairs. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624102 - Qiwei Lin, Gui Feng:
A novel mark embedding and attack identifying technique for watermarking. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410K - Mark Lodato, Ismail Jouny:
A practical timing attack on RSA over a LAN. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624111 - Jidong Long, Daniel G. Schwartz, Sara Stoecklin:
Distinguishing false from true alerts in Snort by data mining patterns of alerts. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410B - Robert S. Lynch Jr., Peter K. Willett
:
An algorithmic approach to mining unknown clusters in training data. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624101 - Vladimir Nikulin:
Threshold-based clustering for intrusion detection systems. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410E - Vladimir Nikulin:
Dimensional reduction of web traffic data. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410J - Suat Özdemir
:
Energy efficient link layer security solution for wireless LANs. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624108 - William G. Perry:
How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624106 - Peili Qiao, Jie Su, Yahui Liu:
Distributed intrusion detection system based on fuzzy rules. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410F - Wenbin Qiu, Yu Wu, Guoyin Wang
, Simon X. Yang
, Jie Bai, Jieying Li:
A novel unsupervised anomaly detection based on robust principal component classifier. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410T - James F. Smith III, ThanhVu H. Nguyen:
Genetic program based data mining to reverse engineer digital logic. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624103 - Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann:
Image sensor for security applications with on-chip data authentication. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624109 - Martin R. Stytz, Sheila B. Banks:
Personal privacy, information assurance, and the threat posed by malware techology. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624107 - Shusaku Tsumoto:
Visualization of similarities and dissimilarities in rules using MDS. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410X - Shusaku Tsumoto, Yuko Tsumoto:
Mining hospital management data. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410W - Tong Wang, Daxin Liu, Xuan-Zuo Lin, Wei Sun:
Clustering method via independent components for semi-structured documents. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410V
skipping 6 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-10 09:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint