default search action
8. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: Orlando, FL, USA
- Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006. SPIE Proceedings 6241, SPIE 2006, ISBN 978-0-8194-6297-8
Data Mining
- Robert S. Lynch Jr., Peter K. Willett:
An algorithmic approach to mining unknown clusters in training data. 624101 - Shuxin Li, Robert Lee, Sheau-Dong Lang:
Efficient mining of strongly correlated item pairs. 624102 - James F. Smith III, ThanhVu H. Nguyen:
Genetic program based data mining to reverse engineer digital logic. 624103 - A. K. Checker, R. Appavu Raj:
Database architecture for data mining to aid real-time range safety decision in a test range. 624104 - Yiyu Yao:
Granular computing for data mining. 624105
Information Assurance and Security
- William G. Perry:
How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains. 624106 - Martin R. Stytz, Sheila B. Banks:
Personal privacy, information assurance, and the threat posed by malware techology. 624107 - Suat Özdemir:
Energy efficient link layer security solution for wireless LANs. 624108 - Peter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann:
Image sensor for security applications with on-chip data authentication. 624109 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:
Mining security events in a distributed agent society. 62410A
Intrusion Detection
- Jidong Long, Daniel G. Schwartz, Sara Stoecklin:
Distinguishing false from true alerts in Snort by data mining patterns of alerts. 62410B - Ruichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung:
A novel interacting multiple model based network intrusion detection scheme. 62410C - Jesús González-Pino, Janica Edmonds, Mauricio Papa:
Attribute selection using information gain for a fuzzy logic intrusion detection system. 62410D - Vladimir Nikulin:
Threshold-based clustering for intrusion detection systems. 62410E - Peili Qiao, Jie Su, Yahui Liu:
Distributed intrusion detection system based on fuzzy rules. 62410F
Internet Applications
- Boris A. Galitsky, Boris Kovalerchuk:
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities. 62410G - Raymond A. Cardillo, John J. Salerno:
Detecting people of interest from internet data sources. 62410H - Jingtao Yao, Wei-Ning Liu:
Web-based dynamic Delphi: a new survey instrument. 62410I - Vladimir Nikulin:
Dimensional reduction of web traffic data. 62410J
Miscellaneous Models and Applications
- Qiwei Lin, Gui Feng:
A novel mark embedding and attack identifying technique for watermarking. 62410K - Alexander Ekimov, James M. Sabatier:
Broad frequency acoustic response of ground/floor to human footsteps. 62410L - Jason Hester, William Yurcik, Roy H. Campbell:
An implementation-independent threat model for group communications. 62410M - Maxwell G. Dondo, Nathalie Japkowicz, Reuben Smith:
AutoCorrel: a neural network event correlation approach. 62410N - Holger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin:
Data modeling for predictive behavior hypothesis formation and testing. 62410P
Intrusion Detection and Network Security
- Kevin J. Kumpf:
End-to-end communications security. 62410R - Matheos Kazantzidis:
Extending key sharing: how to generate a key tightly coupled to a network security policy. 62410S - Wenbin Qiu, Yu Wu, Guoyin Wang, Simon X. Yang, Jie Bai, Jieying Li:
A novel unsupervised anomaly detection based on robust principal component classifier. 62410T - Qiao Yan, Jianping Yu:
AINIDS: an immune-based network intrusion detection system. 62410U
Data Mining Algorithms and Applications
- Tong Wang, Daxin Liu, Xuan-Zuo Lin, Wei Sun:
Clustering method via independent components for semi-structured documents. 62410V - Shusaku Tsumoto, Yuko Tsumoto:
Mining hospital management data. 62410W - Shusaku Tsumoto:
Visualization of similarities and dissimilarities in rules using MDS. 62410X - Thomas G. L. Allen:
Damage assessment of mission essential buildings based on simulation studies of low yield explosives. 62410Y
Poster Session
- Vladimir G. Krasilenko, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev, Konstantin V. Ogorodnik:
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms. 62410Z - Lijuan Zhou, Chi Liu, Chunying Wang:
The design and application of data warehouse during modern enterprises environment. 624110 - Mark Lodato, Ismail Jouny:
A practical timing attack on RSA over a LAN. 624111
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.