Share Email Print
cover

Proceedings of SPIE Volume 5812

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
Editor(s): Belur V. Dasarathy
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 5812
Date Published: 28 March 2005
Softcover: 38 papers (394) pages
ISBN: 9780819457974

Table of Contents
show all abstracts | hide all abstracts
Detecting a malicious executable without prior knowledge of its patterns
Author(s): Dongming Michael Cai; James Theiler; Maya Gokhale
Show Abstract
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques
Author(s): Tansel Ozyer; Reda Alhajj; Ken Barker
Show Abstract
A study on fuzzy intrusion detection
Author(s): Jing Tao Yao; Song Lun Zhao; Larry V. Saxton
Show Abstract
A clustering algorithm for intrusion detection
Author(s): Qiang Wang; Vasileios Megalooikonomou
Show Abstract
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense
Author(s): Mian Zhou; Sheau-Dong Lang
Show Abstract
Network vulnerability assessment using Bayesian networks
Author(s): Yu Liu; Hong Man
Show Abstract
VMSoar: a cognitive agent for network security
Author(s): David P. Benjamin; Ranjita Shankar-Iyer; Archana Perumal
A taxonomy and discussion of software attack technologies
Author(s): Sheila B. Banks; Martin R. Stytz
Show Abstract
Efficient visualization of security events in a large agent society
Author(s): Dipankar Dasgupta; Jose Milet Rodriguez; Sankalp Balachandran
Show Abstract
Situational awareness of a coordinated cyber attack
Author(s): Moises Sudit; Adam Stotz; Michael Holender
Show Abstract
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
Information risk and security modeling
Author(s): Predrag Zivic
Show Abstract
Deducing trapdoor primitives in public key encryption schemes
Author(s): Chandra Pandey
Show Abstract
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm
Author(s): Robert S. Lynch; Peter K. Willett
Show Abstract
Comparing various algorithms for discovering social groups with uni-party data
Author(s): John J. Salerno; Raymond A. Cardillo; Zhongfei Mark Zhang
Show Abstract
Parametric model-based clustering
Author(s): Vladimir Nikulin; Alex J. Smola
Show Abstract
Classification of temporal sequences using multiscale matching and rough clustering
Author(s): Shoji Hirano; Shusaku Tsumoto
Show Abstract
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel
Author(s): Rodolfo A. Fiorini; Gianfranco Dacquino
Show Abstract
Integrating knowledge representation/engineering, the multivariant PNN and machine learning to improve breast cancer diagnosis
Author(s): Walker H. Land; Mark J. Embrechts; Frances R. Anderson; Tom Smith; Lut Wong; Steve Fahlbusch; Robert Choma
Show Abstract
Data-mining-based automated reverse engineering and defect discovery
Author(s): James F. Smith; ThanhVu H. Nguyen
Show Abstract
Predictive fuzzy reasoning method for time series stock market data mining
Author(s): Rashid Hafeez Khokhar; Mohd Noor Md Sap
Show Abstract
Oblique decision tree induction using multimembered evolution strategies
Author(s): Kun Zhang; Zujia Xu; Bill P. Buckles
Show Abstract
Visualizing intelligence information using correlation graphs
Author(s): Vivek Verma; Nikhil Gagvani
Show Abstract
Knowledge extracted from trained neural networks: What's next?
Author(s): Jing Tao Yao
Show Abstract
A fuzzy neural network for intelligent data processing
Author(s): Wei Xie; Feng Chu; Lipo Wang; Eng Thiam Lim
Show Abstract
On statistical independence of a contingency matrix
Author(s): Shusaku Tsumoto; Shoji Hirano
Show Abstract
The pearls of using real world evidence to discover social groups
Author(s): Raymond A. Cardillo; John J. Salerno
Show Abstract
Shai-Hulud: The quest for worm sign
Author(s): Holger M. Jaenisch; James W. Handley; Jeffery P. Faucheux; Ken Lamkin
Show Abstract
Granularity and statistical independence in a contingency table
Author(s): Shusaku Tsumoto
Show Abstract
Dynamic immune intrusion detection system for IPv6
Author(s): Li Yao; Zhi-tang Li; Tu Hao
Show Abstract

© SPIE. Terms of Use
Back to Top