- Vivek Verma, Nikhil Gagvani:
Visualizing intelligence information using correlation graphs. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 271-282 - Qiang Wang, Vasileios Megalooikonomou:
A clustering algorithm for intrusion detection. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 31-38 - Wei Xie, Feng Chu, Lipo Wang, Eng Thiam Lim:
A fuzzy neural network for intelligent data processing. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 283-290 - Jingtao Yao:
Knowledge extracted from trained neural networks: What's next? Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 151-157 - Jingtao Yao, Songlun Zhao, Lawrence V. Saxton:
A study on fuzzy intrusion detection. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 23-30 - Kun Zhang, Zujia Xu, Bill P. Buckles:
Oblique decision tree induction using multimembered evolution strategies. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 263-270 - Mian Zhou, Sheau-Dong Lang:
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 39-51 - Predrag Zivic:
Information risk and security modeling. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 142-150 - Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005. SPIE Proceedings 5812, SPIE 2005, ISBN 978-0-81945797-4 [contents]