Share Email Print
cover

PROCEEDINGS VOLUME 6973

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 6973
Date Published: 16 March 2008
Softcover: 25 papers (260) pages
ISBN: 9780819471642

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 6973
Author(s): Proceedings of SPIE
Integrated mandatory access control for digital data
Author(s): George Hsieh; Gregory Patrick; Keith Foster; Gerald Emamali; Lisa Marvel
Show Abstract
Addressing security issues related to virtual institute distributed activities
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
An innovative middle tier design for protecting federal privacy act data
Author(s): Thomas G. L. Allen
Show Abstract
Mathematical model for security effectiveness figure of merit and its optimization
Author(s): Sheela V. Belur; Jonathan Gloster
Show Abstract
Distributed intrusion detection system based on grid security model
Author(s): Jie Su; Yahui Liu
Show Abstract
Is mining of knowledge possible?
Author(s): Jim Brander; Alex Lupu
Show Abstract
Application of data mining to medical risk management
Author(s): Shusaku Tsumoto; Kimiko Matsuoka; Shigeki Yokoyama
Show Abstract
A data mining approach to intelligence operations
Author(s): Nasrullah Memon; David L. Hicks; Nicholas Harkiolakis
Show Abstract
The epidemic threshold theorem with social and contact heterogeneity
Author(s): Doracelly Hincapié Palacio; Juan Ospina Giraldo; Rubén Darío Gómez Arias
Show Abstract
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing
Author(s): Li-li Tang; Sheng-jie Niu; Shuxian Fan; Xiaofeng Xu; Saihua Jin; Jie Xu
Show Abstract
Intrusion signature creation via clustering anomalies
Author(s): Gilbert R. Hendry; Shanchieh J. Yang
Show Abstract
Securing MANETs with BITSI: danger theory and mission continuity
Author(s): Marco Carvalho; Richard Ford; William Allen; Gerald Marin
Show Abstract
VTAC: virtual terrain assisted impact assessment for cyber attacks
Author(s): Brian J. Argauer; Shanchieh Jay Yang
Show Abstract
Virtual terrain: a security-based representation of a computer network
Author(s): Jared Holsopple; Shanchieh Yang; Brian Argauer
Show Abstract
Usefulness of DARPA dataset for intrusion detection system evaluation
Author(s): Ciza Thomas; Vishwas Sharma; N. Balakrishnan
Show Abstract
Performance comparison of the automatic data reduction system (ADRS)
Author(s): Dan Patterson; David Turner; Arturo Concepcion; Robert Lynch
Show Abstract
Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement
Author(s): Bahareh Haji-saeed; Jed Khoury; Charles L. Woods; John Kierstead
Show Abstract
Adaptive Markov feature estimation and categorization using the projection-slice theorem
Author(s): Vahid R. Riasati
Show Abstract
A new approach to chemical agent detection, classification, and estimation
Author(s): Tao Qian; Genshe Chen; Erik Blasch; Robert Lynch; Yongwei Qi
Show Abstract
Using received signal strength variation for surveillance in residential areas
Author(s): Sajid Hussain; Richard Peters; Daniel L. Silver
Show Abstract
Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition
Author(s): Bahareh Haji-saeed; Jed Khoury; Charles L. Woods; John Kierstead
Show Abstract
Improvement in minority attack detection with skewness in network traffic
Author(s): Ciza Thomas; N. Balakrishnan
Show Abstract
An improved clone selection immune algorithm
Author(s): Peili Qiao; Tong Wang; Jie Su
Show Abstract
An immunity-based model for dynamic distributed intrusion detection
Author(s): Peili Qiao; Tong Wang; Jie Su
Show Abstract
Research on parallel algorithm for sequential pattern mining
Author(s): Lijuan Zhou; Bai Qin; Yu Wang; Zhongxiao Hao
Show Abstract

© SPIE. Terms of Use
Back to Top