default search action
Search dblp for Publications
export results for "toc:db/conf/dmkdttt/dmidiadns2006.bht:"
@inproceedings{DBLP:conf/dmkdttt/Allen06, author = {Thomas G. L. Allen}, editor = {Belur V. Dasarathy}, title = {Damage assessment of mission essential buildings based on simulation studies of low yield explosives}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410Y}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.668518}, doi = {10.1117/12.668518}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Allen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/CardilloS06, author = {Raymond A. Cardillo and John J. Salerno}, editor = {Belur V. Dasarathy}, title = {Detecting people of interest from internet data sources}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410H}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665718}, doi = {10.1117/12.665718}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/CardilloS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/CheckerR06, author = {A. K. Checker and R. Appavu Raj}, editor = {Belur V. Dasarathy}, title = {Database architecture for data mining to aid real-time range safety decision in a test range}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624104}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665519}, doi = {10.1117/12.665519}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/CheckerR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/DasguptaRB06, author = {Dipankar Dasgupta and Jos{\'{e}} M. Rodr{\'{\i}}guez and Sankalp Balachandran}, editor = {Belur V. Dasarathy}, title = {Mining security events in a distributed agent society}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410A}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.661003}, doi = {10.1117/12.661003}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/DasguptaRB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/DondoJS06, author = {Maxwell G. Dondo and Nathalie Japkowicz and Reuben Smith}, editor = {Belur V. Dasarathy}, title = {AutoCorrel: a neural network event correlation approach}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410N}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665041}, doi = {10.1117/12.665041}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/DondoJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/EkimovS06, author = {Alexander Ekimov and James M. Sabatier}, editor = {Belur V. Dasarathy}, title = {Broad frequency acoustic response of ground/floor to human footsteps}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410L}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.663978}, doi = {10.1117/12.663978}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/EkimovS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/GalitskyK06, author = {Boris A. Galitsky and Boris Kovalerchuk}, editor = {Belur V. Dasarathy}, title = {Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410G}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666645}, doi = {10.1117/12.666645}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/GalitskyK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Gonzalez-PinoEP06, author = {Jes{\'{u}}s Gonz{\'{a}}lez{-}Pino and Janica Edmonds and Mauricio Papa}, editor = {Belur V. Dasarathy}, title = {Attribute selection using information gain for a fuzzy logic intrusion detection system}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410D}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666611}, doi = {10.1117/12.666611}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Gonzalez-PinoEP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HesterYC06, author = {Jason Hester and William Yurcik and Roy H. Campbell}, editor = {Belur V. Dasarathy}, title = {An implementation-independent threat model for group communications}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410M}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664962}, doi = {10.1117/12.664962}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/HesterYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHBEGFL06, author = {Holger Jaenisch and James W. Handley and Marvin H. Barnett and Richard Esslinger and David A. Grover and Jeffrey P. Faucheux and Kenneth Lamkin}, editor = {Belur V. Dasarathy}, title = {Data modeling for predictive behavior hypothesis formation and testing}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410P}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666411}, doi = {10.1117/12.666411}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHBEGFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Kazantzidis06, author = {Matheos Kazantzidis}, editor = {Belur V. Dasarathy}, title = {Extending key sharing: how to generate a key tightly coupled to a network security policy}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410S}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664747}, doi = {10.1117/12.664747}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Kazantzidis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/KrasilenkoBNLO06, author = {Vladimir G. Krasilenko and Vitaliy F. Bardachenko and Alexander I. Nikolsky and Alexander A. Lazarev and Konstantin V. Ogorodnik}, editor = {Belur V. Dasarathy}, title = {A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410Z}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.667285}, doi = {10.1117/12.667285}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/KrasilenkoBNLO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Kumpf06, author = {Kevin J. Kumpf}, editor = {Belur V. Dasarathy}, title = {End-to-end communications security}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410R}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.663453}, doi = {10.1117/12.663453}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Kumpf06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LiLL06, author = {Shuxin Li and Robert Lee and Sheau{-}Dong Lang}, editor = {Belur V. Dasarathy}, title = {Efficient mining of strongly correlated item pairs}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624102}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664567}, doi = {10.1117/12.664567}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LiLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LinF06, author = {Qiwei Lin and Gui Feng}, editor = {Belur V. Dasarathy}, title = {A novel mark embedding and attack identifying technique for watermarking}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410K}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.660542}, doi = {10.1117/12.660542}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LinF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LodatoJ06, author = {Mark Lodato and Ismail Jouny}, editor = {Belur V. Dasarathy}, title = {A practical timing attack on {RSA} over a {LAN}}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624111}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.673492}, doi = {10.1117/12.673492}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LodatoJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LongSS06, author = {Jidong Long and Daniel G. Schwartz and Sara Stoecklin}, editor = {Belur V. Dasarathy}, title = {Distinguishing false from true alerts in Snort by data mining patterns of alerts}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410B}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665211}, doi = {10.1117/12.665211}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LongSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LynchW06, author = {Robert S. Lynch Jr. and Peter K. Willett}, editor = {Belur V. Dasarathy}, title = {An algorithmic approach to mining unknown clusters in training data}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624101}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664731}, doi = {10.1117/12.664731}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LynchW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Nikulin06, author = {Vladimir Nikulin}, editor = {Belur V. Dasarathy}, title = {Threshold-based clustering for intrusion detection systems}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410E}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665326}, doi = {10.1117/12.665326}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Nikulin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Nikulin06a, author = {Vladimir Nikulin}, editor = {Belur V. Dasarathy}, title = {Dimensional reduction of web traffic data}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410J}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664767}, doi = {10.1117/12.664767}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Nikulin06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Ozdemir06, author = {Suat {\"{O}}zdemir}, editor = {Belur V. Dasarathy}, title = {Energy efficient link layer security solution for wireless LANs}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624108}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.663947}, doi = {10.1117/12.663947}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Ozdemir06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Perry06, author = {William G. Perry}, editor = {Belur V. Dasarathy}, title = {How {ISO/IEC} 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624106}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.663826}, doi = {10.1117/12.663826}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Perry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/QiaoSL06, author = {Peili Qiao and Jie Su and Yahui Liu}, editor = {Belur V. Dasarathy}, title = {Distributed intrusion detection system based on fuzzy rules}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410F}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665177}, doi = {10.1117/12.665177}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/QiaoSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/QiuWWYBL06, author = {Wenbin Qiu and Yu Wu and Guoyin Wang and Simon X. Yang and Jie Bai and Jieying Li}, editor = {Belur V. Dasarathy}, title = {A novel unsupervised anomaly detection based on robust principal component classifier}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410T}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664383}, doi = {10.1117/12.664383}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/QiuWWYBL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SmithN06, author = {James F. Smith III and ThanhVu H. Nguyen}, editor = {Belur V. Dasarathy}, title = {Genetic program based data mining to reverse engineer digital logic}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624103}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664952}, doi = {10.1117/12.664952}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SmithN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StifterEEH06, author = {Peter Stifter and Kurt Eberhardt and Arnold Erni and Karl Hofmann}, editor = {Belur V. Dasarathy}, title = {Image sensor for security applications with on-chip data authentication}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624109}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665195}, doi = {10.1117/12.665195}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StifterEEH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StytzB06, author = {Martin R. Stytz and Sheila B. Banks}, editor = {Belur V. Dasarathy}, title = {Personal privacy, information assurance, and the threat posed by malware techology}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624107}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665344}, doi = {10.1117/12.665344}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StytzB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Tsumoto06, author = {Shusaku Tsumoto}, editor = {Belur V. Dasarathy}, title = {Visualization of similarities and dissimilarities in rules using {MDS}}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410X}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.667532}, doi = {10.1117/12.667532}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Tsumoto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/TsumotoT06, author = {Shusaku Tsumoto and Yuko Tsumoto}, editor = {Belur V. Dasarathy}, title = {Mining hospital management data}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410W}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.667533}, doi = {10.1117/12.667533}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/TsumotoT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/WangLL006, author = {Tong Wang and Daxin Liu and Xuan{-}Zuo Lin and Wei Sun}, editor = {Belur V. Dasarathy}, title = {Clustering method via independent components for semi-structured documents}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410V}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.665427}, doi = {10.1117/12.665427}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/WangLL006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/XinVL06, author = {Ruichi Xin and Vijayaraghavan Venkatasubramanian and Henry Leung}, editor = {Belur V. Dasarathy}, title = {A novel interacting multiple model based network intrusion detection scheme}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410C}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666087}, doi = {10.1117/12.666087}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/XinVL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/YanY06, author = {Qiao Yan and Jianping Yu}, editor = {Belur V. Dasarathy}, title = {{AINIDS:} an immune-based network intrusion detection system}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410U}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.664752}, doi = {10.1117/12.664752}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/YanY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Yao06, author = {Yiyu Yao}, editor = {Belur V. Dasarathy}, title = {Granular computing for data mining}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624105}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.669023}, doi = {10.1117/12.669023}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Yao06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/YaoL06, author = {Jingtao Yao and Wei{-}Ning Liu}, editor = {Belur V. Dasarathy}, title = {Web-based dynamic Delphi: a new survey instrument}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410I}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666849}, doi = {10.1117/12.666849}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/YaoL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ZhouLW06, author = {Lijuan Zhou and Chi Liu and Chunying Wang}, editor = {Belur V. Dasarathy}, title = {The design and application of data warehouse during modern enterprises environment}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {624110}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.660005}, doi = {10.1117/12.660005}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ZhouLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dmkdttt/2006, editor = {Belur V. Dasarathy}, title = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, publisher = {{SPIE}}, year = {2006}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6241}, isbn = {978-0-8194-6297-8}, timestamp = {Fri, 01 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.