default search action
7. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: Orlando, FL, USA
- Belur V. Dasarathy:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005. SPIE Proceedings 5812, SPIE 2005, ISBN 978-0-81945797-4
Intrusion Detection Tools
- Dongming Cai, James Theiler, Maya B. Gokhale:
Detecting a malicious executable without prior knowledge of its patterns. 1-12 - Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. 13-22 - Jingtao Yao, Songlun Zhao, Lawrence V. Saxton:
A study on fuzzy intrusion detection. 23-30 - Qiang Wang, Vasileios Megalooikonomou:
A clustering algorithm for intrusion detection. 31-38 - Mian Zhou, Sheau-Dong Lang:
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. 39-51 - Yongjun Hai, Yu Wu, Guoyin Wang:
An improved unsupervised clustering-based intrusion detection method. 52-60
Vulnerability Assessment and Network Security
- Yu Liu, Hong Man:
Network vulnerability assessment using Bayesian networks. 61-71 - David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal:
VMSoar: a cognitive agent for network security. 72-80 - Chandra Pandey:
Deducing trapdoor primitives in public key encryption schemes. 81-91
Security Issues
- Sheila B. Banks, Martin R. Stytz:
A taxonomy and discussion of software attack technologies. 92-101 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:
Efficient visualization of security events in a large agent society. 102-113 - Moises Sudit, Adam Stotz, Michael Holender:
Situational awareness of a coordinated cyber attack. 114-129 - Martin R. Stytz, Sheila B. Banks:
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. 130-141 - Predrag Zivic:
Information risk and security modeling. 142-150 - Jingtao Yao:
Knowledge extracted from trained neural networks: What's next? 151-157
Learning, Classification, and Clustering
- Robert S. Lynch Jr., Peter K. Willett:
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. 158-167 - John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang:
Comparing various algorithms for discovering social groups with uni-party data. 168-179 - Danzhou Liu, Charles E. Hughes:
Deducing behaviors from primitive movement attributes. 180-189 - Vladimir Nikulin, Alexander J. Smola:
Parametric model-based clustering. 190-201 - Shoji Hirano, Shusaku Tsumoto:
Classification of temporal sequences using multiscale matching and rough clustering. 202-213 - Rodolfo A. Fiorini, Gianfranco Dacquino:
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. 214-225
Applications
- Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma:
Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. 226-231 - James F. Smith III, ThanhVu H. Nguyen:
Data-mining-based automated reverse engineering and defect discovery. 232-242 - Rashid Hafeez Khokhar, Mohd. Noor Md. Sap:
Predictive fuzzy reasoning method for time series stock market data mining. 243-254
Miscellaneous Tools
- David P. Benjamin, Adrian Walker:
Semantic encoding of relational databases in wireless networks. 255-262 - Kun Zhang, Zujia Xu, Bill P. Buckles:
Oblique decision tree induction using multimembered evolution strategies. 263-270 - Vivek Verma, Nikhil Gagvani:
Visualizing intelligence information using correlation graphs. 271-282 - Wei Xie, Feng Chu, Lipo Wang, Eng Thiam Lim:
A fuzzy neural network for intelligent data processing. 283-290 - Shusaku Tsumoto, Shoji Hirano:
On statistical independence of a contingency matrix. 291-302 - Ching-Cheng Lee, Rashmi Prabhakara:
Web image retrieval using an effective topic and content-based technique. 303-308
Miscellaneous Topics
- Raymond A. Cardillo, John J. Salerno:
The pearls of using real-world evidence to discover social groups. 309-320 - Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin:
Shai-Hulud: The quest for worm sign. 321-329 - Shusaku Tsumoto:
Granularity and statistical independence in a contingency table. 330-341 - Abdelghani Bellaachia, Rajat Bhatt:
An enhanced stream mining approach for network anomaly detection. 342-351
Poster Session
- Deyun Chen, Shujun Pei, Zhiying Quan:
Knowledge base system visualization reasoning model based on ICON. 352-355 - Peili Qiao, Jie Su, Chengwei Sun:
Distributed intrusion detection system based on ARTIS. 356-363 - Yaping Deng, Wei Zhang:
A new method for MPLS-based recovery. 364-373 - Yao Li, Zhitang Li, Hao Tu:
Dynamic immune intrusion detection system for IPv6. 374-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.