default search action
9. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007: Orlando, FL, USA
- Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007. SPIE Proceedings 6570, SPIE 2007, ISBN 978-0-8194-6692-1
Intrusion/Intruder Detection
- Sheila B. Banks, Martin R. Stytz:
Bot armies as threats to network security. 657002 - Jing Hu, Jianbo Gao, Nageswara S. V. Rao:
Defending against Internet worms using a phase space method from chaos theory. 657003 - Hongda Chen, Genshe Chen, Erik Blasch, Martin Kruger, Irma Sityar:
Analysis and visualization of large complex attack graphs for networks security. 657004 - Robert J. Holt, Hong Man, Rainer Martini, Iraban Mukherjee, Ravi Netravali, Jing Wang:
Summary of results on optimal camera placement for boundary monitoring. 657005 - André Grégio, Rafael D. C. Santos, Antonio Montes:
Evaluation of data mining techniques for suspicious network activity classification using honeypots data. 657006 - Ciza Thomas, N. Balakrishnan:
Selection of intrusion detection system threshold bounds for effective sensor fusion. 657007
Data Mining
- Robert S. Lynch Jr., Peter K. Willett:
Mining unknown patterns in data when the features are correlated. 657008 - Vijay P. Shah, Nicolas H. Younan, Surya S. Durbha, Roger L. King:
Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor. 657009 - James F. Smith III, ThanhVu H. Nguyen:
Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat. 65700A
Applications
- Martin R. Stytz, Sheila B. Banks:
Enabling distributed simulation multilevel security using virtual machine and virtual private network technology. 65700B - Basabdatta Sen Bhattacharya, Stephen B. Furber:
Maximising information recovery from rank-order codes. 65700C - Sheela V. Belur, Jonathan Gloster:
Development of a model for assessing the impact of information assurance functionality on secure messaging system performance. 65700D - Shoji Hirano, Shusaku Tsumoto:
Cluster analysis of temporal trajectories of hospital laboratory examinations. 65700E - Shoji Hirano, Shusaku Tsumoto:
Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data. 65700F - Jingtao Yao, Dong Won Kim, Joseph P. Herbert:
Supporting online learning with games. 65700G
Miscellaneous Topics
- Maxwell G. Dondo, Peter Mason, Nathalie Japkowicz, Reuben Smith:
AutoCorrel II: a neural network event correlation approach. 65700H - Brian Ulicny, Ken Baclawski, Amy L. Magnus:
New metrics for blog mining. 65700I - Vahid R. Riasati, Denis Grishin:
Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter. 65700J - Kirk A. Dunkelberger:
Semantic search via concept annealing. 65700K - Anca Doloc-Mihu, Vijay V. Raghavan:
Three-way aspect model (TWAPM) and co-training for image retrieval. 65700L - Ting Wei, Yu Wu, Yinguo Li:
A flexible self-learning model based on granular computing. 65700M
Poster Session
- Lijuan Zhou, Zhongxiao Hao, Chi Liu:
Selecting materialized views using random algorithm. 65700N
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.