Share Email Print


Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009
Editor(s): Belur V. Dasarathy
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a black-and-white photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.

Volume Details

Volume Number: 7344
Date Published: 13 April 2009
Softcover: 22 papers (224) pages
ISBN: 9780819476104

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 7344
Author(s): Proceedings of SPIE
Exploring social relations for the intrusion detection in ad hoc networks
Author(s): Wei Wang; Hong Man
Show Abstract
A comparison of passive optical network security
Author(s): Alan Harris; Mouhamad K. Al Akkoumi; James J. Sluss
Show Abstract
Feature-based alert correlation in security systems using self organizing maps
Author(s): Munesh Kumar; Shoaib Siddique; Humera Noor
Show Abstract
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
Author(s): S. Vimalathithan; S. D. Sudarsan; R. Seker; R. B. Lenin; S. Ramaswamy
Show Abstract
Security in MANETs using reputation-adjusted routing
Author(s): Attila Ondi; Katherine Hoffman; Carlos Perez; Richard Ford; Marco Carvalho; William Allen
Show Abstract
Application of a clustering-remote sensing method in analyzing security patterns
Author(s): Alejandra López-Caloca; Elvia Martínez-Viveros; José Ignacio Chapela-Castañares
Show Abstract
Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classification
Author(s): Robert S. Lynch; Peter K. Willett
Show Abstract
Autonomous journaling response using data model LUTS
Author(s): Holger Jaenisch; James Handley; Nathaniel Albritton; David Whitener; Randel Burnett; Robert Caspers; Stephen Moren; Thomas Alexander; William Maddox; William Albritton
Show Abstract
Temporal data mining for hospital management
Author(s): Shusaku Tsumoto; Shoji Hirano
Show Abstract
Malware distributed collection and pre-classification system using honeypot technology
Author(s): André R. A. Grégio; Isabela L. Oliveira; Rafael D. C. Santos; Adriano M. Cansian; Paulo L. de Geus
Show Abstract
SAM: an interoperable metadata model for multimodal surveillance applications
Author(s): Peter Schallauer; Werner Bailer; Albert Hofmann; Roland Mörzinger
Show Abstract
A method to characterize dataset based on objective rule evaluation indices
Author(s): Hidenao Abe; Shusaku Tsumoto
Show Abstract
Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fields
Author(s): Vahid R. Riasati
Show Abstract
Identifying hidden voice and video streams
Author(s): Jieyan Fan; Dapeng Wu; Antonio Nucci; Ram Keralapura; Lixin Gao
Show Abstract
Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks
Author(s): Sajid Hussain; Md Shafayat Rahman
Show Abstract
Considerations and foundations for Botnet simulation
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
High-speed packet filtering utilizing stream processors
Author(s): Richard J. Hummel; Errin W. Fulp
Show Abstract
Remote object authentication: confidence model, cryptosystem and protocol
Author(s): Jean Lancrenon; Roland Gillard; Thierry Fournel
Show Abstract
Recognition and categorization considerations for information assurance requirements development and speficication
Author(s): Martin R. Stytz; Michael May; Sheila B. Banks
Show Abstract
Design and implementation of workflow engine for service-oriented architecture
Author(s): Shuqing Peng; Huining Duan; Deyun Chen
Show Abstract
Design of data warehouse in teaching state based on OLAP and data mining
Author(s): Lijuan Zhou; Minhua Wu; Shuang Li
Show Abstract
Classification data mining method based on dynamic RBF neural networks
Author(s): Lijuan Zhou; Min Xu; Zhang Zhang; Luping Duan
Show Abstract

© SPIE. Terms of Use
Back to Top