Ebook: Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA
- Tags: Data mining, Database searching, Database security, Intrusion detection systems (Computer security), Expert systems (Computer science), Conference papers and proceedings, Electronic book, Conference publication, Data mining -- Congresses, Intrusion detection systems (Computer security) -- Congresses, Database security -- Congresses, Database searching -- Congresses, Expert systems (Computer science) -- Congresses
- Series: Proceedings of SPIE--the International Society for Optical Engineering 6570
- Year: 2007
- Publisher: Spie
- City: Bellingham;Wash
- Language: English
- pdf
Bot armies as threats to network security / Sheila B. Banks and Martin R. Stytz -- Defending against Internet worms using a phase space method from chaos theory / Jing Hu, Jianbo Gao, and Nageswara S. Rao -- Analysis and visualization of large complex attack graphs for networks security / Hongda Chen [and others] -- Summary of results on optimal camera placement for boundary monitoring / Robert J. Holt [and others] -- Evaluation of data mining techniques for suspicious network activity classification using honeypots data / André Grégio, Rafael Santos, and Antonio Montes -- Selection of intrusion detection system threshold bounds for effective sensor fusion / Ciza Thomas and Narayanaswamy Balakrishnan -- Mining unknown patterns in data when the features are correlated / Robert S. Lynch, Jr. and Peter K. Willett -- Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor / Vijay P. Shah [and others] -- Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat / James F. Smith III and ThanhVu H. Nguyen -- Enabling distributed simulation multilevel security using virtual machine and virtual private network technology / Martin R. Stytz and Sheila B. Banks -- Maximising information recovery from rank-order codes / B. Sen and S. Furber -- Development of a model for assessing the impact of information assurance functionality on secure messaging system performance / Sheela V. Belur and Jonathan Gloster -- Cluster analysis of temporal trajectories of hospital laboratory examinations / Shoji Hirano and Shusaku Tsumoto -- Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data / Shoji Hirano and Shusaku Tsumoto -- Supporting online learning with games / JingTao Yao, DongWon Kim, and Joseph P. Herbert -- AutoCorrel II: a neural network event correlation approach / Maxwell G. Dondo [and others] -- New metrics for blog mining / Brian Ulicny, Ken Baclawski, and Amy Magnus -- Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter / Vahid R. Riasati and Denis Grishin -- Semantic search via concept annealing / Kirk A. Dunkelberger -- Three-way aspect model (TWAPM) and co-training for image retrieval / Anca Doloc-Mihu and Vijay V. Raghavan -- A flexible self-learning model based on granular computing / Ting Wei, Yu Wu, and Yinguo Li -- Selecting materialized views using random algorithm / Lijuan Zhou, Zhongxiao Hao, and Chi Liu.
Download the book Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)