![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
10. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: Orlando, FL, USA
- Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008. SPIE Proceedings 6973, SPIE 2008, ISBN 978-0-8194-7164-2
Information Assurance and Security
- George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel:
Integrated mandatory access control for digital data. 697302 - Martin R. Stytz, Sheila B. Banks:
Addressing security issues related to virtual institute distributed activities. 697303 - Thomas G. L. Allen:
An innovative middle tier design for protecting federal privacy act data. 697304 - Sheela V. Belur, Jonathan Gloster:
Mathematical model for security effectiveness figure of merit and its optimization. 697305 - Jie Su, Yahui Liu:
Distributed intrusion detection system based on grid security model. 697306
Data Mining
- Jim Brander, Alex Lupu:
Is mining of knowledge possible? 697307 - Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama:
Application of data mining to medical risk management. 697308 - Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis
:
A data mining approach to intelligence operations. 697309 - Doracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias:
The epidemic threshold theorem with social and contact heterogeneity. 69730A - Lili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu:
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing. 69730B
Intrusion Detection
- Gilbert Hendry, Shanchieh Jay Yang:
Intrusion signature creation via clustering anomalies. 69730C - Marco Carvalho
, Richard Ford, William H. Allen, Gerald A. Marin:
Securing MANETs with BITSI: danger theory and mission continuity. 69730D - Jared Holsopple, Shanchieh Jay Yang, Brian Argauer:
Virtual terrain: a security-based representation of a computer network. 69730E - Brian Argauer, Shanchieh Jay Yang:
VTAC: virtual terrain assisted impact assessment for cyber attacks. 69730F - Ciza Thomas, Vishwas Sharma, N. Balakrishnan:
Usefulness of DARPA dataset for intrusion detection system evaluation. 69730G
Miscellaneous Topics
- Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr.:
Performance comparison of the automatic data reduction system (ADRS). 69730H - Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead:
Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement. 69730I - Vahid R. Riasati:
Adaptive Markov feature estimation and categorization using the projection-slice theorem. 69730J
Miscellaneous Applications
- Tao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi:
A new approach to chemical agent detection, classification, and estimation. 69730K - Sajid Hussain, Richard Peters, Daniel L. Silver:
Using received signal strength variation for surveillance in residential areas. 69730L - Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead:
Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition. 69730M - Ciza Thomas, N. Balakrishnan:
Improvement in minority attack detection with skewness in network traffic. 69730N
Poster Session
- Peili Qiao, Tong Wang, Jie Su:
An improved clone selection immune algorithm. 69730O - Peili Qiao, Tong Wang, Jie Su:
An immunity-based model for dynamic distributed intrusion detection. 69730P - Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao:
Research on parallel algorithm for sequential pattern mining. 69730Q
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.