PROCEEDINGS VOLUME 6570
DEFENSE AND SECURITY SYMPOSIUM | 9-13 APRIL 2007
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007
Editor(s): Belur V. Dasarathy
IN THIS VOLUME

6 Sessions, 23 Papers, 0 Presentations
Front Matter  (1)
Data Mining  (3)
Applications  (6)
Proceedings Volume 6570 is from: Logo
DEFENSE AND SECURITY SYMPOSIUM
9-13 April 2007
Orlando, Florida, United States
Front Matter
Proc. SPIE 6570, Front Matter: Volume 6570, 657001 (9 April 2007); https://doi.org/10.1117/12.731816
Intrusion/Intruder Detection
Proc. SPIE 6570, Bot armies as threats to network security, 657002 (9 April 2007); https://doi.org/10.1117/12.724246
Proc. SPIE 6570, Defending against Internet worms using a phase space method from chaos theory, 657003 (9 April 2007); https://doi.org/10.1117/12.719026
Proc. SPIE 6570, Analysis and visualization of large complex attack graphs for networks security, 657004 (9 April 2007); https://doi.org/10.1117/12.720035
Proc. SPIE 6570, Summary of results on optimal camera placement for boundary monitoring, 657005 (9 April 2007); https://doi.org/10.1117/12.719139
Proc. SPIE 6570, Evaluation of data mining techniques for suspicious network activity classification using honeypots data, 657006 (9 April 2007); https://doi.org/10.1117/12.719023
Proc. SPIE 6570, Selection of intrusion detection system threshold bounds for effective sensor fusion, 657007 (9 April 2007); https://doi.org/10.1117/12.719295
Data Mining
Proc. SPIE 6570, Mining unknown patterns in data when the features are correlated, 657008 (9 April 2007); https://doi.org/10.1117/12.719423
Proc. SPIE 6570, Image information mining from geospatial archives based on a combination of the wavelet transform and Fourier phase descriptor, 657009 (9 April 2007); https://doi.org/10.1117/12.719917
Proc. SPIE 6570, Genetic program based data mining of fuzzy decision trees and methods of improving convergence and reducing bloat, 65700A (9 April 2007); https://doi.org/10.1117/12.716973
Applications
Proc. SPIE 6570, Enabling distributed simulation multilevel security using virtual machine and virtual private network technology, 65700B (9 April 2007); https://doi.org/10.1117/12.724256
Proc. SPIE 6570, Maximising information recovery from rank-order codes, 65700C (9 April 2007); https://doi.org/10.1117/12.717799
Proc. SPIE 6570, Development of a model for assessing the impact of information assurance functionality on secure messaging system performance, 65700D (9 April 2007); https://doi.org/10.1117/12.720343
Proc. SPIE 6570, Cluster analysis of temporal trajectories of hospital laboratory examinations, 65700E (9 April 2007); https://doi.org/10.1117/12.720168
Proc. SPIE 6570, Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data, 65700F (9 April 2007); https://doi.org/10.1117/12.720169
Proc. SPIE 6570, Supporting online learning with games, 65700G (9 April 2007); https://doi.org/10.1117/12.723321
Miscellaneous Topics
Proc. SPIE 6570, AutoCorrel II: a neural network event correlation approach, 65700H (9 April 2007); https://doi.org/10.1117/12.707922
Proc. SPIE 6570, New metrics for blog mining, 65700I (9 April 2007); https://doi.org/10.1117/12.720454
Proc. SPIE 6570, Adaptive Grahm-Schmidt orthogonalization for the projection-slice synthetic discriminant function filter, 65700J (9 April 2007); https://doi.org/10.1117/12.720891
Proc. SPIE 6570, Semantic search via concept annealing, 65700K (9 April 2007); https://doi.org/10.1117/12.720039
Proc. SPIE 6570, Three-way aspect model (TWAPM) and co-training for image retrieval, 65700L (9 April 2007); https://doi.org/10.1117/12.720153
Proc. SPIE 6570, A flexible self-learning model based on granular computing, 65700M (9 April 2007); https://doi.org/10.1117/12.718325
Poster Session
Proc. SPIE 6570, Selecting materialized views using random algorithm, 65700N (9 April 2007); https://doi.org/10.1117/12.716612
Back to Top