Search dblp for Publications

export results for "toc:db/conf/dmkdttt/dmidiadns2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dmkdttt/Allen06,
  author       = {Thomas G. L. Allen},
  editor       = {Belur V. Dasarathy},
  title        = {Damage assessment of mission essential buildings based on simulation
                  studies of low yield explosives},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410Y},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.668518},
  doi          = {10.1117/12.668518},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Allen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/CardilloS06,
  author       = {Raymond A. Cardillo and
                  John J. Salerno},
  editor       = {Belur V. Dasarathy},
  title        = {Detecting people of interest from internet data sources},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410H},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665718},
  doi          = {10.1117/12.665718},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/CardilloS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/CheckerR06,
  author       = {A. K. Checker and
                  R. Appavu Raj},
  editor       = {Belur V. Dasarathy},
  title        = {Database architecture for data mining to aid real-time range safety
                  decision in a test range},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624104},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665519},
  doi          = {10.1117/12.665519},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/CheckerR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/DasguptaRB06,
  author       = {Dipankar Dasgupta and
                  Jos{\'{e}} M. Rodr{\'{\i}}guez and
                  Sankalp Balachandran},
  editor       = {Belur V. Dasarathy},
  title        = {Mining security events in a distributed agent society},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410A},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.661003},
  doi          = {10.1117/12.661003},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/DasguptaRB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/DondoJS06,
  author       = {Maxwell G. Dondo and
                  Nathalie Japkowicz and
                  Reuben Smith},
  editor       = {Belur V. Dasarathy},
  title        = {AutoCorrel: a neural network event correlation approach},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410N},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665041},
  doi          = {10.1117/12.665041},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/DondoJS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/EkimovS06,
  author       = {Alexander Ekimov and
                  James M. Sabatier},
  editor       = {Belur V. Dasarathy},
  title        = {Broad frequency acoustic response of ground/floor to human footsteps},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410L},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.663978},
  doi          = {10.1117/12.663978},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/EkimovS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/GalitskyK06,
  author       = {Boris A. Galitsky and
                  Boris Kovalerchuk},
  editor       = {Belur V. Dasarathy},
  title        = {Mining emotional profiles using e-mail messages for earlier warnings
                  of potential terrorist activities},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410G},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666645},
  doi          = {10.1117/12.666645},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/GalitskyK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Gonzalez-PinoEP06,
  author       = {Jes{\'{u}}s Gonz{\'{a}}lez{-}Pino and
                  Janica Edmonds and
                  Mauricio Papa},
  editor       = {Belur V. Dasarathy},
  title        = {Attribute selection using information gain for a fuzzy logic intrusion
                  detection system},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410D},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666611},
  doi          = {10.1117/12.666611},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Gonzalez-PinoEP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HesterYC06,
  author       = {Jason Hester and
                  William Yurcik and
                  Roy H. Campbell},
  editor       = {Belur V. Dasarathy},
  title        = {An implementation-independent threat model for group communications},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410M},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664962},
  doi          = {10.1117/12.664962},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HesterYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHBEGFL06,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Marvin H. Barnett and
                  Richard Esslinger and
                  David A. Grover and
                  Jeffrey P. Faucheux and
                  Kenneth Lamkin},
  editor       = {Belur V. Dasarathy},
  title        = {Data modeling for predictive behavior hypothesis formation and testing},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410P},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666411},
  doi          = {10.1117/12.666411},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHBEGFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Kazantzidis06,
  author       = {Matheos Kazantzidis},
  editor       = {Belur V. Dasarathy},
  title        = {Extending key sharing: how to generate a key tightly coupled to a
                  network security policy},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410S},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664747},
  doi          = {10.1117/12.664747},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Kazantzidis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/KrasilenkoBNLO06,
  author       = {Vladimir G. Krasilenko and
                  Vitaliy F. Bardachenko and
                  Alexander I. Nikolsky and
                  Alexander A. Lazarev and
                  Konstantin V. Ogorodnik},
  editor       = {Belur V. Dasarathy},
  title        = {A noise-immune cryptographic information protection method for facsimile
                  information transmission and the realization algorithms},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410Z},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.667285},
  doi          = {10.1117/12.667285},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/KrasilenkoBNLO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Kumpf06,
  author       = {Kevin J. Kumpf},
  editor       = {Belur V. Dasarathy},
  title        = {End-to-end communications security},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410R},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.663453},
  doi          = {10.1117/12.663453},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Kumpf06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LiLL06,
  author       = {Shuxin Li and
                  Robert Lee and
                  Sheau{-}Dong Lang},
  editor       = {Belur V. Dasarathy},
  title        = {Efficient mining of strongly correlated item pairs},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624102},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664567},
  doi          = {10.1117/12.664567},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LiLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LinF06,
  author       = {Qiwei Lin and
                  Gui Feng},
  editor       = {Belur V. Dasarathy},
  title        = {A novel mark embedding and attack identifying technique for watermarking},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410K},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.660542},
  doi          = {10.1117/12.660542},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LinF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LodatoJ06,
  author       = {Mark Lodato and
                  Ismail Jouny},
  editor       = {Belur V. Dasarathy},
  title        = {A practical timing attack on {RSA} over a {LAN}},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624111},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.673492},
  doi          = {10.1117/12.673492},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LodatoJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LongSS06,
  author       = {Jidong Long and
                  Daniel G. Schwartz and
                  Sara Stoecklin},
  editor       = {Belur V. Dasarathy},
  title        = {Distinguishing false from true alerts in Snort by data mining patterns
                  of alerts},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410B},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665211},
  doi          = {10.1117/12.665211},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LongSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LynchW06,
  author       = {Robert S. Lynch Jr. and
                  Peter K. Willett},
  editor       = {Belur V. Dasarathy},
  title        = {An algorithmic approach to mining unknown clusters in training data},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624101},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664731},
  doi          = {10.1117/12.664731},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LynchW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Nikulin06,
  author       = {Vladimir Nikulin},
  editor       = {Belur V. Dasarathy},
  title        = {Threshold-based clustering for intrusion detection systems},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410E},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665326},
  doi          = {10.1117/12.665326},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Nikulin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Nikulin06a,
  author       = {Vladimir Nikulin},
  editor       = {Belur V. Dasarathy},
  title        = {Dimensional reduction of web traffic data},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410J},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664767},
  doi          = {10.1117/12.664767},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Nikulin06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Ozdemir06,
  author       = {Suat {\"{O}}zdemir},
  editor       = {Belur V. Dasarathy},
  title        = {Energy efficient link layer security solution for wireless LANs},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624108},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.663947},
  doi          = {10.1117/12.663947},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Ozdemir06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Perry06,
  author       = {William G. Perry},
  editor       = {Belur V. Dasarathy},
  title        = {How {ISO/IEC} 17799 can be used for base lining information assurance
                  among entities using data mining for defense, homeland security, commercial,
                  and other civilian/commercial domains},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624106},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.663826},
  doi          = {10.1117/12.663826},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Perry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/QiaoSL06,
  author       = {Peili Qiao and
                  Jie Su and
                  Yahui Liu},
  editor       = {Belur V. Dasarathy},
  title        = {Distributed intrusion detection system based on fuzzy rules},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410F},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665177},
  doi          = {10.1117/12.665177},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/QiaoSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/QiuWWYBL06,
  author       = {Wenbin Qiu and
                  Yu Wu and
                  Guoyin Wang and
                  Simon X. Yang and
                  Jie Bai and
                  Jieying Li},
  editor       = {Belur V. Dasarathy},
  title        = {A novel unsupervised anomaly detection based on robust principal component
                  classifier},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410T},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664383},
  doi          = {10.1117/12.664383},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/QiuWWYBL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SmithN06,
  author       = {James F. Smith III and
                  ThanhVu H. Nguyen},
  editor       = {Belur V. Dasarathy},
  title        = {Genetic program based data mining to reverse engineer digital logic},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624103},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664952},
  doi          = {10.1117/12.664952},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SmithN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StifterEEH06,
  author       = {Peter Stifter and
                  Kurt Eberhardt and
                  Arnold Erni and
                  Karl Hofmann},
  editor       = {Belur V. Dasarathy},
  title        = {Image sensor for security applications with on-chip data authentication},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624109},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665195},
  doi          = {10.1117/12.665195},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StifterEEH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StytzB06,
  author       = {Martin R. Stytz and
                  Sheila B. Banks},
  editor       = {Belur V. Dasarathy},
  title        = {Personal privacy, information assurance, and the threat posed by malware
                  techology},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624107},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665344},
  doi          = {10.1117/12.665344},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StytzB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Tsumoto06,
  author       = {Shusaku Tsumoto},
  editor       = {Belur V. Dasarathy},
  title        = {Visualization of similarities and dissimilarities in rules using {MDS}},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410X},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.667532},
  doi          = {10.1117/12.667532},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Tsumoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/TsumotoT06,
  author       = {Shusaku Tsumoto and
                  Yuko Tsumoto},
  editor       = {Belur V. Dasarathy},
  title        = {Mining hospital management data},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410W},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.667533},
  doi          = {10.1117/12.667533},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/TsumotoT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/WangLL006,
  author       = {Tong Wang and
                  Daxin Liu and
                  Xuan{-}Zuo Lin and
                  Wei Sun},
  editor       = {Belur V. Dasarathy},
  title        = {Clustering method via independent components for semi-structured documents},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410V},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.665427},
  doi          = {10.1117/12.665427},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/WangLL006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/XinVL06,
  author       = {Ruichi Xin and
                  Vijayaraghavan Venkatasubramanian and
                  Henry Leung},
  editor       = {Belur V. Dasarathy},
  title        = {A novel interacting multiple model based network intrusion detection
                  scheme},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410C},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666087},
  doi          = {10.1117/12.666087},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/XinVL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/YanY06,
  author       = {Qiao Yan and
                  Jianping Yu},
  editor       = {Belur V. Dasarathy},
  title        = {{AINIDS:} an immune-based network intrusion detection system},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410U},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.664752},
  doi          = {10.1117/12.664752},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/YanY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Yao06,
  author       = {Yiyu Yao},
  editor       = {Belur V. Dasarathy},
  title        = {Granular computing for data mining},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624105},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.669023},
  doi          = {10.1117/12.669023},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Yao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/YaoL06,
  author       = {Jingtao Yao and
                  Wei{-}Ning Liu},
  editor       = {Belur V. Dasarathy},
  title        = {Web-based dynamic Delphi: a new survey instrument},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {62410I},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.666849},
  doi          = {10.1117/12.666849},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/YaoL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ZhouLW06,
  author       = {Lijuan Zhou and
                  Chi Liu and
                  Chunying Wang},
  editor       = {Belur V. Dasarathy},
  title        = {The design and application of data warehouse during modern enterprises
                  environment},
  booktitle    = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  pages        = {624110},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.660005},
  doi          = {10.1117/12.660005},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ZhouLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dmkdttt/2006,
  editor       = {Belur V. Dasarathy},
  title        = {Data Mining, Intrusion Detection, Information Assurance, and Data
                  Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6241},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6241},
  isbn         = {978-0-8194-6297-8},
  timestamp    = {Fri, 01 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}