default search action
Search dblp for Publications
export results for "toc:db/conf/dmkdttt/dmidiadns2005.bht:"
@inproceedings{DBLP:conf/dmkdttt/0002LT05, author = {Yao Li and Zhitang Li and Hao Tu}, editor = {Belur V. Dasarathy}, title = {Dynamic immune intrusion detection system for IPv6}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {374}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.602039}, doi = {10.1117/12.602039}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/0002LT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/BanksS05, author = {Sheila B. Banks and Martin R. Stytz}, editor = {Belur V. Dasarathy}, title = {A taxonomy and discussion of software attack technologies}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {92--101}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603161}, doi = {10.1117/12.603161}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/BanksS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/BellaachiaB05, author = {Abdelghani Bellaachia and Rajat Bhatt}, editor = {Belur V. Dasarathy}, title = {An enhanced stream mining approach for network anomaly detection}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {342--351}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.611168}, doi = {10.1117/12.611168}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/BellaachiaB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/BenjaminSP05, author = {David P. Benjamin and Ranjita Shankar{-}Iyer and Archana Perumal}, editor = {Belur V. Dasarathy}, title = {VMSoar: a cognitive agent for network security}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {72--80}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.602015}, doi = {10.1117/12.602015}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/BenjaminSP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/BenjaminW05, author = {David P. Benjamin and Adrian Walker}, editor = {Belur V. Dasarathy}, title = {Semantic encoding of relational databases in wireless networks}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {255--262}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.602013}, doi = {10.1117/12.602013}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/BenjaminW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/CaiTG05, author = {Dongming Cai and James Theiler and Maya B. Gokhale}, editor = {Belur V. Dasarathy}, title = {Detecting a malicious executable without prior knowledge of its patterns}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {1--12}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603174}, doi = {10.1117/12.603174}, timestamp = {Mon, 20 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/CaiTG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/CardilloS05, author = {Raymond A. Cardillo and John J. Salerno}, editor = {Belur V. Dasarathy}, title = {The pearls of using real-world evidence to discover social groups}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {309--320}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603763}, doi = {10.1117/12.603763}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/CardilloS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ChenPQ05, author = {Deyun Chen and Shujun Pei and Zhiying Quan}, editor = {Belur V. Dasarathy}, title = {Knowledge base system visualization reasoning model based on {ICON}}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {352--355}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.596954}, doi = {10.1117/12.596954}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ChenPQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/DasguptaRB05, author = {Dipankar Dasgupta and Jos{\'{e}} M. Rodr{\'{\i}}guez and Sankalp Balachandran}, editor = {Belur V. Dasarathy}, title = {Efficient visualization of security events in a large agent society}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {102--113}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603240}, doi = {10.1117/12.603240}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/DasguptaRB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/DengZ05, author = {Yaping Deng and Wei Zhang}, editor = {Belur V. Dasarathy}, title = {A new method for MPLS-based recovery}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {364--373}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.601902}, doi = {10.1117/12.601902}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/DengZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/FioriniD05, author = {Rodolfo A. Fiorini and Gianfranco Dacquino}, editor = {Belur V. Dasarathy}, title = {Improved object optimal synthetic description, modeling, learning, and discrimination by {GEOGINE} computational kernel}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {214--225}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603560}, doi = {10.1117/12.603560}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/FioriniD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HaiWW05, author = {Yongjun Hai and Yu Wu and Guoyin Wang}, editor = {Belur V. Dasarathy}, title = {An improved unsupervised clustering-based intrusion detection method}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {52--60}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603086}, doi = {10.1117/12.603086}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/HaiWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HiranoT05, author = {Shoji Hirano and Shusaku Tsumoto}, editor = {Belur V. Dasarathy}, title = {Classification of temporal sequences using multiscale matching and rough clustering}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {202--213}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604976}, doi = {10.1117/12.604976}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/HiranoT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHFL05, author = {Holger Jaenisch and James W. Handley and Jeffrey P. Faucheux and Ken Lamkin}, editor = {Belur V. Dasarathy}, title = {Shai-Hulud: The quest for worm sign}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {321--329}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603367}, doi = {10.1117/12.603367}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHFL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/KhokharS05, author = {Rashid Hafeez Khokhar and Mohd. Noor Md. Sap}, editor = {Belur V. Dasarathy}, title = {Predictive fuzzy reasoning method for time series stock market data mining}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {243--254}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603089}, doi = {10.1117/12.603089}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/KhokharS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LandEASWFC05, author = {Walker H. Land Jr. and Mark J. Embrechts and Frances R. Anderson and Tom Smith and Lut Wong and Stephen Fahlbusch and Robert Choma}, editor = {Belur V. Dasarathy}, title = {Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {226--231}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604575}, doi = {10.1117/12.604575}, timestamp = {Tue, 22 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LandEASWFC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LeeP05, author = {Ching{-}Cheng Lee and Rashmi Prabhakara}, editor = {Belur V. Dasarathy}, title = {Web image retrieval using an effective topic and content-based technique}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {303--308}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.601946}, doi = {10.1117/12.601946}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LeeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LiuH05, author = {Danzhou Liu and Charles E. Hughes}, editor = {Belur V. Dasarathy}, title = {Deducing behaviors from primitive movement attributes}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {180--189}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604149}, doi = {10.1117/12.604149}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/LiuH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LiuM05, author = {Yu Liu and Hong Man}, editor = {Belur V. Dasarathy}, title = {Network vulnerability assessment using Bayesian networks}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {61--71}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604240}, doi = {10.1117/12.604240}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LiuM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LynchW05, author = {Robert S. Lynch Jr. and Peter K. Willett}, editor = {Belur V. Dasarathy}, title = {Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {158--167}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603522}, doi = {10.1117/12.603522}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LynchW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/NikulinS05, author = {Vladimir Nikulin and Alexander J. Smola}, editor = {Belur V. Dasarathy}, title = {Parametric model-based clustering}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {190--201}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603199}, doi = {10.1117/12.603199}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/NikulinS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/OzyerAB05, author = {Tansel {\"{O}}zyer and Reda Alhajj and Ken Barker}, editor = {Belur V. Dasarathy}, title = {Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {13--22}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603273}, doi = {10.1117/12.603273}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/OzyerAB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Pandey05, author = {Chandra Pandey}, editor = {Belur V. Dasarathy}, title = {Deducing trapdoor primitives in public key encryption schemes}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {81--91}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.601515}, doi = {10.1117/12.601515}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Pandey05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/QiaoSS05, author = {Peili Qiao and Jie Su and Chengwei Sun}, editor = {Belur V. Dasarathy}, title = {Distributed intrusion detection system based on {ARTIS}}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {356--363}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.601862}, doi = {10.1117/12.601862}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/QiaoSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SalernoCZ05, author = {John J. Salerno and Raymond A. Cardillo and Zhongfei (Mark) Zhang}, editor = {Belur V. Dasarathy}, title = {Comparing various algorithms for discovering social groups with uni-party data}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {168--179}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603680}, doi = {10.1117/12.603680}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SalernoCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SmithN05, author = {James F. Smith III and ThanhVu H. Nguyen}, editor = {Belur V. Dasarathy}, title = {Data-mining-based automated reverse engineering and defect discovery}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {232--242}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.602077}, doi = {10.1117/12.602077}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SmithN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StytzB05, author = {Martin R. Stytz and Sheila B. Banks}, editor = {Belur V. Dasarathy}, title = {Toward improved software security training using a cyber warfare opposing force {(CW} {OPFOR):} the knowledge base design}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {130--141}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603160}, doi = {10.1117/12.603160}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StytzB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SuditSH05, author = {Moises Sudit and Adam Stotz and Michael Holender}, editor = {Belur V. Dasarathy}, title = {Situational awareness of a coordinated cyber attack}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {114--129}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.606980}, doi = {10.1117/12.606980}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SuditSH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Tsumoto05, author = {Shusaku Tsumoto}, editor = {Belur V. Dasarathy}, title = {Granularity and statistical independence in a contingency table}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {330--341}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604977}, doi = {10.1117/12.604977}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Tsumoto05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/TsumotoH05, author = {Shusaku Tsumoto and Shoji Hirano}, editor = {Belur V. Dasarathy}, title = {On statistical independence of a contingency matrix}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {291--302}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604975}, doi = {10.1117/12.604975}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/TsumotoH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/VermaG05, author = {Vivek Verma and Nikhil Gagvani}, editor = {Belur V. Dasarathy}, title = {Visualizing intelligence information using correlation graphs}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {271--282}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604040}, doi = {10.1117/12.604040}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/VermaG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/WangM05, author = {Qiang Wang and Vasileios Megalooikonomou}, editor = {Belur V. Dasarathy}, title = {A clustering algorithm for intrusion detection}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {31--38}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603567}, doi = {10.1117/12.603567}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/WangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/XieCWL05, author = {Wei Xie and Feng Chu and Lipo Wang and Eng Thiam Lim}, editor = {Belur V. Dasarathy}, title = {A fuzzy neural network for intelligent data processing}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {283--290}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603175}, doi = {10.1117/12.603175}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/XieCWL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Yao05, author = {Jingtao Yao}, editor = {Belur V. Dasarathy}, title = {Knowledge extracted from trained neural networks: What's next?}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {151--157}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604463}, doi = {10.1117/12.604463}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/Yao05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/YaoZS05, author = {Jingtao Yao and Songlun Zhao and Lawrence V. Saxton}, editor = {Belur V. Dasarathy}, title = {A study on fuzzy intrusion detection}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {23--30}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604465}, doi = {10.1117/12.604465}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/YaoZS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ZhangXB05, author = {Kun Zhang and Zujia Xu and Bill P. Buckles}, editor = {Belur V. Dasarathy}, title = {Oblique decision tree induction using multimembered evolution strategies}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {263--270}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.596766}, doi = {10.1117/12.596766}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ZhangXB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ZhouL05, author = {Mian Zhou and Sheau{-}Dong Lang}, editor = {Belur V. Dasarathy}, title = {Weighted link graphs: a distributed {IDS} for secondary intrusion detection and defense}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {39--51}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603857}, doi = {10.1117/12.603857}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ZhouL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Zivic05, author = {Predrag Zivic}, editor = {Belur V. Dasarathy}, title = {Information risk and security modeling}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {142--150}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.604602}, doi = {10.1117/12.604602}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Zivic05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dmkdttt/2005, editor = {Belur V. Dasarathy}, title = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, publisher = {{SPIE}}, year = {2005}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5812}, isbn = {978-0-81945797-4}, timestamp = {Sun, 03 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.