PROCEEDINGS VOLUME 5812
DEFENSE AND SECURITY | 28 MARCH - 1 APRIL 2005
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
Editor(s): Belur V. Dasarathy
DEFENSE AND SECURITY
28 March - 1 April 2005
Orlando, Florida, United States
Intrusion Detection Tools
Proc. SPIE 5812, Detecting a malicious executable without prior knowledge of its patterns, 0000 (28 March 2005); https://doi.org/10.1117/12.603174
Proc. SPIE 5812, Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques, 0000 (28 March 2005); https://doi.org/10.1117/12.603273
Proc. SPIE 5812, A study on fuzzy intrusion detection, 0000 (28 March 2005); https://doi.org/10.1117/12.604465
Proc. SPIE 5812, A clustering algorithm for intrusion detection, 0000 (28 March 2005); https://doi.org/10.1117/12.603567
Proc. SPIE 5812, Weighted link graphs: a distributed IDS for secondary intrusion detection and defense, 0000 (28 March 2005); https://doi.org/10.1117/12.603857
Proc. SPIE 5812, An improved unsupervised clustering-based intrusion detection method, 0000 (28 March 2005); https://doi.org/10.1117/12.603086
Vulnerability Assessment and Network Security
Proc. SPIE 5812, Network vulnerability assessment using Bayesian networks, 0000 (28 March 2005); https://doi.org/10.1117/12.604240
Proc. SPIE 5812, VMSoar: a cognitive agent for network security, 0000 (28 March 2005); https://doi.org/10.1117/12.602015
Security Issues
Proc. SPIE 5812, A taxonomy and discussion of software attack technologies, 0000 (28 March 2005); https://doi.org/10.1117/12.603161
Proc. SPIE 5812, Efficient visualization of security events in a large agent society, 0000 (28 March 2005); https://doi.org/10.1117/12.603240
Proc. SPIE 5812, Situational awareness of a coordinated cyber attack, 0000 (28 March 2005); https://doi.org/10.1117/12.606980
Proc. SPIE 5812, Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design, 0000 (28 March 2005); https://doi.org/10.1117/12.603160
Proc. SPIE 5812, Information risk and security modeling, 0000 (28 March 2005); https://doi.org/10.1117/12.604602
Vulnerability Assessment and Network Security
Proc. SPIE 5812, Deducing trapdoor primitives in public key encryption schemes, 0000 (28 March 2005); https://doi.org/10.1117/12.601515
Learning, Classification, and Clustering
Proc. SPIE 5812, Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm, 0000 (28 March 2005); https://doi.org/10.1117/12.603522
Proc. SPIE 5812, Comparing various algorithms for discovering social groups with uni-party data, 0000 (28 March 2005); https://doi.org/10.1117/12.603680
Proc. SPIE 5812, Deducing behaviors from primitive movement attributes, 0000 (28 March 2005); https://doi.org/10.1117/12.604149
Proc. SPIE 5812, Parametric model-based clustering, 0000 (28 March 2005); https://doi.org/10.1117/12.603199
Proc. SPIE 5812, Classification of temporal sequences using multiscale matching and rough clustering, 0000 (28 March 2005); https://doi.org/10.1117/12.604976
Proc. SPIE 5812, Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel, 0000 (28 March 2005); https://doi.org/10.1117/12.603560
Applications
Proc. SPIE 5812, Integrating knowledge representation/engineering, the multivariant PNN and machine learning to improve breast cancer diagnosis, 0000 (28 March 2005); https://doi.org/10.1117/12.604575
Proc. SPIE 5812, Data-mining-based automated reverse engineering and defect discovery, 0000 (28 March 2005); https://doi.org/10.1117/12.602077
Proc. SPIE 5812, Predictive fuzzy reasoning method for time series stock market data mining, 0000 (28 March 2005); https://doi.org/10.1117/12.603089
Miscellaneous Tools
Proc. SPIE 5812, Semantic encoding of relational databases in wireless networks, 0000 (28 March 2005); https://doi.org/10.1117/12.602013
Proc. SPIE 5812, Oblique decision tree induction using multimembered evolution strategies, 0000 (28 March 2005); https://doi.org/10.1117/12.596766
Proc. SPIE 5812, Visualizing intelligence information using correlation graphs, 0000 (28 March 2005); https://doi.org/10.1117/12.604040
Security Issues
Proc. SPIE 5812, Knowledge extracted from trained neural networks: What's next?, 0000 (28 March 2005); https://doi.org/10.1117/12.604463
Miscellaneous Tools
Proc. SPIE 5812, A fuzzy neural network for intelligent data processing, 0000 (28 March 2005); https://doi.org/10.1117/12.603175
Proc. SPIE 5812, On statistical independence of a contingency matrix, 0000 (28 March 2005); https://doi.org/10.1117/12.604975
Proc. SPIE 5812, Web image retrieval using an effective topic and content-based technique, 0000 (28 March 2005); https://doi.org/10.1117/12.601946
Miscellaneous Topics
Proc. SPIE 5812, The pearls of using real world evidence to discover social groups, 0000 (28 March 2005); https://doi.org/10.1117/12.603763
Proc. SPIE 5812, Shai-Hulud: The quest for worm sign, 0000 (28 March 2005); https://doi.org/10.1117/12.603367
Proc. SPIE 5812, Granularity and statistical independence in a contingency table, 0000 (28 March 2005); https://doi.org/10.1117/12.604977
Poster Session
Proc. SPIE 5812, Knowledge base system visualization reasoning model based on ICON, 0000 (28 March 2005); https://doi.org/10.1117/12.596954
Proc. SPIE 5812, Distributed intrusion detection system based on ARTIS, 0000 (28 March 2005); https://doi.org/10.1117/12.601862
Proc. SPIE 5812, A new method for MPLS-based recovery, 0000 (28 March 2005); https://doi.org/10.1117/12.601902
Proc. SPIE 5812, Dynamic immune intrusion detection system for IPv6, 0000 (28 March 2005); https://doi.org/10.1117/12.602039
Miscellaneous Topics
Proc. SPIE 5812, An enhanced stream mining approach for network anomaly detection, 0000 (28 March 2005); https://doi.org/10.1117/12.611168
Back to Top