Search dblp for Publications

export results for "toc:db/conf/dmkdttt/dmidiadns2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dmkdttt/0002LT05,
  author       = {Yao Li and
                  Zhitang Li and
                  Hao Tu},
  editor       = {Belur V. Dasarathy},
  title        = {Dynamic immune intrusion detection system for IPv6},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {374},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.602039},
  doi          = {10.1117/12.602039},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/0002LT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/BanksS05,
  author       = {Sheila B. Banks and
                  Martin R. Stytz},
  editor       = {Belur V. Dasarathy},
  title        = {A taxonomy and discussion of software attack technologies},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {92--101},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603161},
  doi          = {10.1117/12.603161},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/BanksS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/BellaachiaB05,
  author       = {Abdelghani Bellaachia and
                  Rajat Bhatt},
  editor       = {Belur V. Dasarathy},
  title        = {An enhanced stream mining approach for network anomaly detection},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {342--351},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.611168},
  doi          = {10.1117/12.611168},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/BellaachiaB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/BenjaminSP05,
  author       = {David P. Benjamin and
                  Ranjita Shankar{-}Iyer and
                  Archana Perumal},
  editor       = {Belur V. Dasarathy},
  title        = {VMSoar: a cognitive agent for network security},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {72--80},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.602015},
  doi          = {10.1117/12.602015},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/BenjaminSP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/BenjaminW05,
  author       = {David P. Benjamin and
                  Adrian Walker},
  editor       = {Belur V. Dasarathy},
  title        = {Semantic encoding of relational databases in wireless networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {255--262},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.602013},
  doi          = {10.1117/12.602013},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/BenjaminW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/CaiTG05,
  author       = {Dongming Cai and
                  James Theiler and
                  Maya B. Gokhale},
  editor       = {Belur V. Dasarathy},
  title        = {Detecting a malicious executable without prior knowledge of its patterns},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {1--12},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603174},
  doi          = {10.1117/12.603174},
  timestamp    = {Mon, 20 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/CaiTG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/CardilloS05,
  author       = {Raymond A. Cardillo and
                  John J. Salerno},
  editor       = {Belur V. Dasarathy},
  title        = {The pearls of using real-world evidence to discover social groups},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {309--320},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603763},
  doi          = {10.1117/12.603763},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/CardilloS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ChenPQ05,
  author       = {Deyun Chen and
                  Shujun Pei and
                  Zhiying Quan},
  editor       = {Belur V. Dasarathy},
  title        = {Knowledge base system visualization reasoning model based on {ICON}},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {352--355},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.596954},
  doi          = {10.1117/12.596954},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ChenPQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/DasguptaRB05,
  author       = {Dipankar Dasgupta and
                  Jos{\'{e}} M. Rodr{\'{\i}}guez and
                  Sankalp Balachandran},
  editor       = {Belur V. Dasarathy},
  title        = {Efficient visualization of security events in a large agent society},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {102--113},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603240},
  doi          = {10.1117/12.603240},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/DasguptaRB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/DengZ05,
  author       = {Yaping Deng and
                  Wei Zhang},
  editor       = {Belur V. Dasarathy},
  title        = {A new method for MPLS-based recovery},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {364--373},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.601902},
  doi          = {10.1117/12.601902},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/DengZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/FioriniD05,
  author       = {Rodolfo A. Fiorini and
                  Gianfranco Dacquino},
  editor       = {Belur V. Dasarathy},
  title        = {Improved object optimal synthetic description, modeling, learning,
                  and discrimination by {GEOGINE} computational kernel},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {214--225},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603560},
  doi          = {10.1117/12.603560},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/FioriniD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HaiWW05,
  author       = {Yongjun Hai and
                  Yu Wu and
                  Guoyin Wang},
  editor       = {Belur V. Dasarathy},
  title        = {An improved unsupervised clustering-based intrusion detection method},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {52--60},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603086},
  doi          = {10.1117/12.603086},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HaiWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HiranoT05,
  author       = {Shoji Hirano and
                  Shusaku Tsumoto},
  editor       = {Belur V. Dasarathy},
  title        = {Classification of temporal sequences using multiscale matching and
                  rough clustering},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {202--213},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604976},
  doi          = {10.1117/12.604976},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HiranoT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHFL05,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Jeffrey P. Faucheux and
                  Ken Lamkin},
  editor       = {Belur V. Dasarathy},
  title        = {Shai-Hulud: The quest for worm sign},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {321--329},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603367},
  doi          = {10.1117/12.603367},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHFL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/KhokharS05,
  author       = {Rashid Hafeez Khokhar and
                  Mohd. Noor Md. Sap},
  editor       = {Belur V. Dasarathy},
  title        = {Predictive fuzzy reasoning method for time series stock market data
                  mining},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {243--254},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603089},
  doi          = {10.1117/12.603089},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/KhokharS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LandEASWFC05,
  author       = {Walker H. Land Jr. and
                  Mark J. Embrechts and
                  Frances R. Anderson and
                  Tom Smith and
                  Lut Wong and
                  Stephen Fahlbusch and
                  Robert Choma},
  editor       = {Belur V. Dasarathy},
  title        = {Integrating knowledge representation/engineering, the multivariant
                  PNN, and machine learning to improve breast cancer diagnosis},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {226--231},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604575},
  doi          = {10.1117/12.604575},
  timestamp    = {Tue, 22 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LandEASWFC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LeeP05,
  author       = {Ching{-}Cheng Lee and
                  Rashmi Prabhakara},
  editor       = {Belur V. Dasarathy},
  title        = {Web image retrieval using an effective topic and content-based technique},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {303--308},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.601946},
  doi          = {10.1117/12.601946},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LeeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LiuH05,
  author       = {Danzhou Liu and
                  Charles E. Hughes},
  editor       = {Belur V. Dasarathy},
  title        = {Deducing behaviors from primitive movement attributes},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {180--189},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604149},
  doi          = {10.1117/12.604149},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LiuH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LiuM05,
  author       = {Yu Liu and
                  Hong Man},
  editor       = {Belur V. Dasarathy},
  title        = {Network vulnerability assessment using Bayesian networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {61--71},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604240},
  doi          = {10.1117/12.604240},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LiuM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LynchW05,
  author       = {Robert S. Lynch Jr. and
                  Peter K. Willett},
  editor       = {Belur V. Dasarathy},
  title        = {Utilizing unsupervised learning to cluster data in the Bayesian data
                  reduction algorithm},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {158--167},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603522},
  doi          = {10.1117/12.603522},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LynchW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/NikulinS05,
  author       = {Vladimir Nikulin and
                  Alexander J. Smola},
  editor       = {Belur V. Dasarathy},
  title        = {Parametric model-based clustering},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {190--201},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603199},
  doi          = {10.1117/12.603199},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/NikulinS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/OzyerAB05,
  author       = {Tansel {\"{O}}zyer and
                  Reda Alhajj and
                  Ken Barker},
  editor       = {Belur V. Dasarathy},
  title        = {Intrusion detection: a novel approach that combines boosting genetic
                  fuzzy classifier and data mining techniques},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {13--22},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603273},
  doi          = {10.1117/12.603273},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/OzyerAB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Pandey05,
  author       = {Chandra Pandey},
  editor       = {Belur V. Dasarathy},
  title        = {Deducing trapdoor primitives in public key encryption schemes},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {81--91},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.601515},
  doi          = {10.1117/12.601515},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Pandey05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/QiaoSS05,
  author       = {Peili Qiao and
                  Jie Su and
                  Chengwei Sun},
  editor       = {Belur V. Dasarathy},
  title        = {Distributed intrusion detection system based on {ARTIS}},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {356--363},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.601862},
  doi          = {10.1117/12.601862},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/QiaoSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SalernoCZ05,
  author       = {John J. Salerno and
                  Raymond A. Cardillo and
                  Zhongfei (Mark) Zhang},
  editor       = {Belur V. Dasarathy},
  title        = {Comparing various algorithms for discovering social groups with uni-party
                  data},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {168--179},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603680},
  doi          = {10.1117/12.603680},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SalernoCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SmithN05,
  author       = {James F. Smith III and
                  ThanhVu H. Nguyen},
  editor       = {Belur V. Dasarathy},
  title        = {Data-mining-based automated reverse engineering and defect discovery},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {232--242},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.602077},
  doi          = {10.1117/12.602077},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SmithN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StytzB05,
  author       = {Martin R. Stytz and
                  Sheila B. Banks},
  editor       = {Belur V. Dasarathy},
  title        = {Toward improved software security training using a cyber warfare opposing
                  force {(CW} {OPFOR):} the knowledge base design},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {130--141},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603160},
  doi          = {10.1117/12.603160},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StytzB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SuditSH05,
  author       = {Moises Sudit and
                  Adam Stotz and
                  Michael Holender},
  editor       = {Belur V. Dasarathy},
  title        = {Situational awareness of a coordinated cyber attack},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {114--129},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.606980},
  doi          = {10.1117/12.606980},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SuditSH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Tsumoto05,
  author       = {Shusaku Tsumoto},
  editor       = {Belur V. Dasarathy},
  title        = {Granularity and statistical independence in a contingency table},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {330--341},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604977},
  doi          = {10.1117/12.604977},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Tsumoto05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/TsumotoH05,
  author       = {Shusaku Tsumoto and
                  Shoji Hirano},
  editor       = {Belur V. Dasarathy},
  title        = {On statistical independence of a contingency matrix},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {291--302},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604975},
  doi          = {10.1117/12.604975},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/TsumotoH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/VermaG05,
  author       = {Vivek Verma and
                  Nikhil Gagvani},
  editor       = {Belur V. Dasarathy},
  title        = {Visualizing intelligence information using correlation graphs},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {271--282},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604040},
  doi          = {10.1117/12.604040},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/VermaG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/WangM05,
  author       = {Qiang Wang and
                  Vasileios Megalooikonomou},
  editor       = {Belur V. Dasarathy},
  title        = {A clustering algorithm for intrusion detection},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {31--38},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603567},
  doi          = {10.1117/12.603567},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/WangM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/XieCWL05,
  author       = {Wei Xie and
                  Feng Chu and
                  Lipo Wang and
                  Eng Thiam Lim},
  editor       = {Belur V. Dasarathy},
  title        = {A fuzzy neural network for intelligent data processing},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {283--290},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603175},
  doi          = {10.1117/12.603175},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/XieCWL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Yao05,
  author       = {Jingtao Yao},
  editor       = {Belur V. Dasarathy},
  title        = {Knowledge extracted from trained neural networks: What's next?},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {151--157},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604463},
  doi          = {10.1117/12.604463},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Yao05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/YaoZS05,
  author       = {Jingtao Yao and
                  Songlun Zhao and
                  Lawrence V. Saxton},
  editor       = {Belur V. Dasarathy},
  title        = {A study on fuzzy intrusion detection},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {23--30},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604465},
  doi          = {10.1117/12.604465},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/YaoZS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ZhangXB05,
  author       = {Kun Zhang and
                  Zujia Xu and
                  Bill P. Buckles},
  editor       = {Belur V. Dasarathy},
  title        = {Oblique decision tree induction using multimembered evolution strategies},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {263--270},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.596766},
  doi          = {10.1117/12.596766},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ZhangXB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ZhouL05,
  author       = {Mian Zhou and
                  Sheau{-}Dong Lang},
  editor       = {Belur V. Dasarathy},
  title        = {Weighted link graphs: a distributed {IDS} for secondary intrusion
                  detection and defense},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {39--51},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.603857},
  doi          = {10.1117/12.603857},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ZhouL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Zivic05,
  author       = {Predrag Zivic},
  editor       = {Belur V. Dasarathy},
  title        = {Information risk and security modeling},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  pages        = {142--150},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.604602},
  doi          = {10.1117/12.604602},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Zivic05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dmkdttt/2005,
  editor       = {Belur V. Dasarathy},
  title        = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005},
  series       = {{SPIE} Proceedings},
  volume       = {5812},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5812},
  isbn         = {978-0-81945797-4},
  timestamp    = {Sun, 03 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}