Share Email Print

Proceedings of SPIE Volume 6570

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007
Editor(s): Belur V. Dasarathy
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.

Volume Details

Volume Number: 6570
Date Published: 9 April 2007
Softcover: 22 papers (242) pages
ISBN: 9780819466921

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6570
Author(s): Proceedings of SPIE
Defending against Internet worms using a phase space method from chaos theory
Author(s): Jing Hu; Jianbo Gao; Nageswara S. Rao
Show Abstract
Analysis and visualization of large complex attack graphs for networks security
Author(s): Hongda Chen; Genshe Chen; Erik Blasch; Martin Kruger; Irma Sityar
Show Abstract
Summary of results on optimal camera placement for boundary monitoring
Author(s): Robert J. Holt; Hong Man; Rainer Martini; Iraban Mukherjee; Ravi Netravali; Jing Wang
Show Abstract
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
Author(s): André Grégio; Rafael Santos; Antonio Montes
Show Abstract
Selection of intrusion detection system threshold bounds for effective sensor fusion
Author(s): Ciza Thomas; Narayanaswamy Balakrishnan
Show Abstract
Mining unknown patterns in data when the features are correlated
Author(s): Robert S. Lynch; Peter K. Willett
Show Abstract
Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor
Author(s): Vijay P. Shah; Nicholas H. Younan; Surya S. Durbha; Roger L. King
Show Abstract
Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat
Author(s): James F. Smith; Thanh Vu H. Nguyen
Show Abstract
Maximising information recovery from rank-order codes
Author(s): B. Sen; S. Furber
Show Abstract
Development of a model for assessing the impact of information assurance functionality on secure messaging system performance
Author(s): Sheela V. Belur; Jonathan Gloster
Show Abstract
Cluster analysis of temporal trajectories of hospital laboratory examinations
Author(s): Shoji Hirano; Shusaku Tsumoto
Show Abstract
Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data
Author(s): Shoji Hirano; Shusaku Tsumoto
Show Abstract
AutoCorrel II: a neural network event correlation approach
Author(s): Maxwell G. Dondo; Peter Mason; Nathalie Japkowicz; Reuben Smith
Show Abstract
New metrics for blog mining
Author(s): Brian Ulicny; Ken Baclawski; Amy Magnus
Show Abstract
Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter
Author(s): Vahid R. Riasati; Denis Grishin
Show Abstract
Semantic search via concept annealing
Author(s): Kirk A. Dunkelberger
Show Abstract
Three-way aspect model (TWAPM) and co-training for image retrieval
Author(s): Anca Doloc-Mihu; Vijay V. Raghavan
Show Abstract
A flexible self-learning model based on granular computing
Author(s): Ting Wei; Yu Wu; Yinguo Li
Show Abstract
Supporting online learning with games
Author(s): JingTao Yao; DongWon Kim; Joseph P. Herbert
Show Abstract
Selecting materialized views using random algorithm
Author(s): Lijuan Zhou; Zhongxiao Hao; Chi Liu
Show Abstract
Enabling distributed simulation multilevel security using virtual machine and virtual private network technology
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
Bot armies as threats to network security
Author(s): Sheila B. Banks; Martin R. Stytz
Show Abstract

© SPIE. Terms of Use
Back to Top