Share Email Print


Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
Editor(s): Belur V. Dasarathy

*This item is only available on the SPIE Digital Library.

Volume Details

Volume Number: 5812
Date Published: 28 March 2005

Table of Contents
show all abstracts | hide all abstracts
Detecting a malicious executable without prior knowledge of its patterns
Author(s): Dongming Michael Cai; James Theiler; Maya Gokhale
Show Abstract
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques
Author(s): Tansel Ozyer; Reda Alhajj; Ken Barker
Show Abstract
A study on fuzzy intrusion detection
Author(s): Jing Tao Yao; Song Lun Zhao; Larry V. Saxton
Show Abstract
A clustering algorithm for intrusion detection
Author(s): Qiang Wang; Vasileios Megalooikonomou
Show Abstract
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense
Author(s): Mian Zhou; Sheau-Dong Lang
Show Abstract
An improved unsupervised clustering-based intrusion detection method
Author(s): Yong Jun Hai; Yu Wu; Guo Yin Wang
Show Abstract
Network vulnerability assessment using Bayesian networks
Author(s): Yu Liu; Hong Man
Show Abstract
VMSoar: a cognitive agent for network security
Author(s): David P. Benjamin; Ranjita Shankar-Iyer; Archana Perumal
Show Abstract
A taxonomy and discussion of software attack technologies
Author(s): Sheila B. Banks; Martin R. Stytz
Show Abstract
Efficient visualization of security events in a large agent society
Author(s): Dipankar Dasgupta; Jose Milet Rodriguez; Sankalp Balachandran
Show Abstract
Situational awareness of a coordinated cyber attack
Author(s): Moises Sudit; Adam Stotz; Michael Holender
Show Abstract
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
Information risk and security modeling
Author(s): Predrag Zivic
Show Abstract
Deducing trapdoor primitives in public key encryption schemes
Author(s): Chandra Pandey
Show Abstract
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm
Author(s): Robert S. Lynch Jr.; Peter K. Willett
Show Abstract
Comparing various algorithms for discovering social groups with uni-party data
Author(s): John J. Salerno; Raymond A. Cardillo; Zhongfei Mark Zhang
Show Abstract
Deducing behaviors from primitive movement attributes
Author(s): Danzhou Liu; Charles E. Hughes
Show Abstract
Parametric model-based clustering
Author(s): Vladimir Nikulin; Alex J. Smola
Show Abstract
Classification of temporal sequences using multiscale matching and rough clustering
Author(s): Shoji Hirano; Shusaku Tsumoto
Show Abstract
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel
Author(s): Rodolfo A. Fiorini; Gianfranco Dacquino
Show Abstract
Integrating knowledge representation/engineering, the multivariant PNN and machine learning to improve breast cancer diagnosis
Author(s): Walker H. Land Jr.; Mark J. Embrechts; Frances R. Anderson; Tom Smith; Lut Wong; Steve Fahlbusch; Robert Choma
Show Abstract
Data-mining-based automated reverse engineering and defect discovery
Author(s): James F. Smith III; ThanhVu H. Nguyen
Show Abstract
Predictive fuzzy reasoning method for time series stock market data mining
Author(s): Rashid Hafeez Khokhar; Mohd Noor Md Sap
Show Abstract
Semantic encoding of relational databases in wireless networks
Author(s): David P. Benjamin; Adrian Walker
Show Abstract
Oblique decision tree induction using multimembered evolution strategies
Author(s): Kun Zhang; Zujia Xu; Bill P. Buckles
Show Abstract
Visualizing intelligence information using correlation graphs
Author(s): Vivek Verma; Nikhil Gagvani
Show Abstract
Knowledge extracted from trained neural networks: What's next?
Author(s): Jing Tao Yao
Show Abstract
A fuzzy neural network for intelligent data processing
Author(s): Wei Xie; Feng Chu; Lipo Wang; Eng Thiam Lim
Show Abstract
On statistical independence of a contingency matrix
Author(s): Shusaku Tsumoto; Shoji Hirano
Show Abstract
Web image retrieval using an effective topic and content-based technique
Author(s): Ching-Cheng Lee; Rashmi Prabhakara
Show Abstract
The pearls of using real world evidence to discover social groups
Author(s): Raymond A. Cardillo; John J. Salerno
Show Abstract
Shai-Hulud: The quest for worm sign
Author(s): Holger M. Jaenisch; James W. Handley; Jeffery P. Faucheux; Ken Lamkin
Show Abstract
Granularity and statistical independence in a contingency table
Author(s): Shusaku Tsumoto
Show Abstract
Knowledge base system visualization reasoning model based on ICON
Author(s): Deyun Chen; Shujun Pei; Zhiying Quan
Show Abstract
Distributed intrusion detection system based on ARTIS
Author(s): Peili Qiao; Jie Su; Chengwei Sun
Show Abstract
A new method for MPLS-based recovery
Author(s): Yaping Deng; Wei Zhang
Show Abstract
Dynamic immune intrusion detection system for IPv6
Author(s): Li Yao; Zhi-tang Li; Tu Hao
Show Abstract
An enhanced stream mining approach for network anomaly detection
Author(s): Abdelghani Bellaachia; Rajat Bhatt
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?