PROCEEDINGS VOLUME 6241
DEFENSE AND SECURITY SYMPOSIUM | 17-21 APRIL 2006
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006
Editor(s): Belur V. Dasarathy
Proceedings Volume 6241 is from: Logo
DEFENSE AND SECURITY SYMPOSIUM
17-21 April 2006
Orlando (Kissimmee), Florida, United States
Data Mining
Proc. SPIE 6241, An algorithmic approach to mining unknown clusters in training data, 624101 (18 April 2006); https://doi.org/10.1117/12.664731
Proc. SPIE 6241, Efficient mining of strongly correlated item pairs, 624102 (18 April 2006); https://doi.org/10.1117/12.664567
Proc. SPIE 6241, Genetic program based data mining to reverse engineer digital logic, 624103 (18 April 2006); https://doi.org/10.1117/12.664952
Proc. SPIE 6241, Database architecture for data mining to aid real-time range safety decision in a test range, 624104 (18 April 2006); https://doi.org/10.1117/12.665519
Proc. SPIE 6241, Granular computing for data mining, 624105 (18 April 2006); https://doi.org/10.1117/12.669023
Information Assurance and Security
Proc. SPIE 6241, How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains, 624106 (18 April 2006); https://doi.org/10.1117/12.663826
Proc. SPIE 6241, Personal privacy, information assurance, and the threat posed by malware techology, 624107 (18 April 2006); https://doi.org/10.1117/12.665344
Proc. SPIE 6241, Energy efficient link layer security solution for wireless LANs, 624108 (18 April 2006); https://doi.org/10.1117/12.663947
Proc. SPIE 6241, Image sensor for security applications with on-chip data authentication, 624109 (18 April 2006); https://doi.org/10.1117/12.665195
Proc. SPIE 6241, Mining security events in a distributed agent society, 62410A (18 April 2006); https://doi.org/10.1117/12.661003
Intrusion Detection
Proc. SPIE 6241, Distinguishing false from true alerts in Snort by data mining patterns of alerts, 62410B (18 April 2006); https://doi.org/10.1117/12.665211
Proc. SPIE 6241, A novel interacting multiple model based network intrusion detection scheme, 62410C (18 April 2006); https://doi.org/10.1117/12.666087
Proc. SPIE 6241, Attribute selection using information gain for a fuzzy logic intrusion detection system, 62410D (18 April 2006); https://doi.org/10.1117/12.666611
Proc. SPIE 6241, Threshold-based Clustering for Intrusion Detection Systems, 62410E (18 April 2006); https://doi.org/10.1117/12.665326
Proc. SPIE 6241, Distributed intrusion detection system based on fuzzy rules, 62410F (17 April 2006); https://doi.org/10.1117/12.665177
Internet Applications
Proc. SPIE 6241, Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activities, 62410G (18 April 2006); https://doi.org/10.1117/12.666645
Proc. SPIE 6241, Detecting people of interest from internet data sources, 62410H (18 April 2006); https://doi.org/10.1117/12.665718
Proc. SPIE 6241, Web-based dynamic Delphi: a new survey instrument, 62410I (18 April 2006); https://doi.org/10.1117/12.666849
Proc. SPIE 6241, Dimensional reduction of web traffic data, 62410J (18 April 2006); https://doi.org/10.1117/12.664767
Miscellaneous Models and Applications
Proc. SPIE 6241, A novel mark embedding and attack identifying technique for watermarking, 62410K (18 April 2006); https://doi.org/10.1117/12.660542
Proc. SPIE 6241, Broad frequency acoustic response of ground/floor to human footsteps, 62410L (18 April 2006); https://doi.org/10.1117/12.663978
Proc. SPIE 6241, An implementation-independent threat model for group communications, 62410M (18 April 2006); https://doi.org/10.1117/12.664962
Proc. SPIE 6241, AutoCorrel: a neural network event correlation approach, 62410N (18 April 2006); https://doi.org/10.1117/12.665041
Proc. SPIE 6241, Data Modeling for predictive behavior hypothesis formation and testing, 62410P (18 April 2006); https://doi.org/10.1117/12.666411
Intrusion Detection and Network Security
Proc. SPIE 6241, End-to-end communications security, 62410R (18 April 2006); https://doi.org/10.1117/12.663453
Proc. SPIE 6241, Extending key sharing: how to generate a key tightly coupled to a network security policy, 62410S (18 April 2006); https://doi.org/10.1117/12.664747
Proc. SPIE 6241, A novel unsupervised anomaly detection based on robust principal component classifier, 62410T (18 April 2006); https://doi.org/10.1117/12.664383
Proc. SPIE 6241, AINIDS: an immune-based network intrusion detection system, 62410U (18 April 2006); https://doi.org/10.1117/12.664752
Data Mining Algorithms and Applications
Proc. SPIE 6241, Clustering method via independent components for semi-structured documents, 62410V (18 April 2006); https://doi.org/10.1117/12.665427
Proc. SPIE 6241, Mining hospital management data, 62410W (18 April 2006); https://doi.org/10.1117/12.667533
Proc. SPIE 6241, Visualization of similarities and dissimilarities in rules using MDS, 62410X (18 April 2006); https://doi.org/10.1117/12.667532
Proc. SPIE 6241, Damage assessment of mission essential buildings based on simulation studies of low yield explosives, 62410Y (18 April 2006); https://doi.org/10.1117/12.668518
Poster Session
Proc. SPIE 6241, A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms, 62410Z (18 April 2006); https://doi.org/10.1117/12.667285
Proc. SPIE 6241, The design and application of data warehouse during modern enterprises environment, 624110 (18 April 2006); https://doi.org/10.1117/12.660005
Proc. SPIE 6241, A practical timing attack on RSA over a LAN, 624111 (18 April 2006); https://doi.org/10.1117/12.673492
Back to Top