Share Email Print


Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006
Editor(s): Belur V. Dasarathy

*This item is only available on the SPIE Digital Library.

Volume Details

Volume Number: 6241
Date Published: 17 April 2006

Table of Contents
show all abstracts | hide all abstracts
An algorithmic approach to mining unknown clusters in training data
Author(s): Robert S. Lynch Jr.; Peter K. Willett
Show Abstract
Efficient mining of strongly correlated item pairs
Author(s): Shuxin Li; Robert Lee; Sheau-Dong Lang
Show Abstract
Genetic program based data mining to reverse engineer digital logic
Author(s): James F. Smith III; Thanh Vu H. Nguyen
Show Abstract
Database architecture for data mining to aid real-time range safety decision in a test range
Author(s): A. K. Checker; R. Appavu Raj
Show Abstract
Granular computing for data mining
Author(s): Yiyu Yao
Show Abstract
How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains
Author(s): William G. Perry
Show Abstract
Personal privacy, information assurance, and the threat posed by malware techology
Author(s): Martin R. Stytz; Sheila B. Banks
Show Abstract
Energy efficient link layer security solution for wireless LANs
Author(s): Suat Ozdemir
Show Abstract
Image sensor for security applications with on-chip data authentication
Author(s): P. Stifter; K. Eberhardt; A. Erni; K. Hofmann
Show Abstract
Mining security events in a distributed agent society
Author(s): D. Dasgupta; J. Rodríguez; S. Balachandran
Show Abstract
Distinguishing false from true alerts in Snort by data mining patterns of alerts
Author(s): Jidong Long; Daniel Schwartz; Sara Stoecklin
Show Abstract
A novel interacting multiple model based network intrusion detection scheme
Author(s): Ruichi Xin; Vijay Venkatasubramanian; Henry Leung
Show Abstract
Attribute selection using information gain for a fuzzy logic intrusion detection system
Author(s): Jesús González-Pino; Janica Edmonds; Mauricio Papa
Show Abstract
Threshold-based Clustering for Intrusion Detection Systems
Author(s): Vladimir Nikulin
Show Abstract
Distributed intrusion detection system based on fuzzy rules
Author(s): Peili Qiao; Jie Su; Yahui Liu
Show Abstract
Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities
Author(s): Boris Galitsky; Boris Kovalerchuk
Show Abstract
Detecting people of interest from internet data sources
Author(s): Raymond A. Cardillo; John J. Salerno
Show Abstract
Web-based dynamic Delphi: a new survey instrument
Author(s): JingTao Yao; Wei-Ning Liu
Show Abstract
Dimensional reduction of web traffic data
Author(s): Vladimir Nikulin
Show Abstract
A novel mark embedding and attack identifying technique for watermarking
Author(s): Qi Wei Lin; Gui Feng
Show Abstract
Broad frequency acoustic response of ground/floor to human footsteps
Author(s): Alexander Ekimov; James M. Sabatier
Show Abstract
An implementation-independent threat model for group communications
Author(s): Jason Hester; William Yurcik; Roy Campbell
Show Abstract
AutoCorrel: a neural network event correlation approach
Author(s): Maxwell G. Dondo; Nathalie Japkowicz; Reuben Smith
Show Abstract
Data Modeling for predictive behavior hypothesis formation and testing
Author(s): Holger M. Jaenisch; James W. Handley; Marvin H. Barnett; Richard Esslinger; David A. Grover; Jeffrey P. Faucheux; Kenneth Lamkin
Show Abstract
End-to-end communications security
Author(s): Kevin J. Kumpf
Show Abstract
Extending key sharing: how to generate a key tightly coupled to a network security policy
Author(s): Matheos Kazantzidis
Show Abstract
A novel unsupervised anomaly detection based on robust principal component classifier
Author(s): Wenbin Qiu; Yu Wu; Guoyin Wang; Simon X. Yang; Jie Bai; Jieying Li
Show Abstract
AINIDS: an immune-based network intrusion detection system
Author(s): Qiao Yan; Jianping Yu
Show Abstract
Clustering method via independent components for semi-structured documents
Author(s): Tong Wang; Da-Xin Liu; Xuanzuo Lin; Wei Sun
Show Abstract
Mining hospital management data
Author(s): Shusaku Tsumoto; Yuko Tsumoto
Show Abstract
Visualization of similarities and dissimilarities in rules using MDS
Author(s): Shusaku Tsumoto
Show Abstract
Damage assessment of mission essential buildings based on simulation studies of low yield explosives
Author(s): Thomas G. L. Allen
Show Abstract
A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms
Author(s): Vladimir G. Krasilenko; Vitaliy F. Bardachenko; Alexander I. Nikolsky; Alexander A. Lazarev; Konstantin V. Ogorodnik
Show Abstract
The design and application of data warehouse during modern enterprises environment
Author(s): Lijuan Zhou; Chi Liu; Chunying Wang
Show Abstract
A practical timing attack on RSA over a LAN
Author(s): Mark J. Lodato; Ismail Jouny
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?