PROCEEDINGS VOLUME 6973
SPIE DEFENSE AND SECURITY SYMPOSIUM | 16-20 MARCH 2008
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
IN THIS VOLUME

7 Sessions, 26 Papers, 0 Presentations
Front Matter  (1)
Data Mining  (5)
Proceedings Volume 6973 is from: Logo
SPIE DEFENSE AND SECURITY SYMPOSIUM
16-20 March 2008
Orlando, Florida, United States
Front Matter
Proc. SPIE 6973, Front Matter: Volume 6973, 697301 (19 March 2008); doi: 10.1117/12.795156
Information Assurance and Security
Proc. SPIE 6973, Integrated mandatory access control for digital data, 697302 (17 March 2008); doi: 10.1117/12.777135
Proc. SPIE 6973, Addressing security issues related to virtual institute distributed activities, 697303 (17 March 2008); doi: 10.1117/12.778006
Proc. SPIE 6973, An innovative middle tier design for protecting federal privacy act data, 697304 (17 March 2008); doi: 10.1117/12.770415
Proc. SPIE 6973, Mathematical model for security effectiveness figure of merit and its optimization, 697305 (17 March 2008); doi: 10.1117/12.775781
Proc. SPIE 6973, Distributed intrusion detection system based on grid security model, 697306 (17 March 2008); doi: 10.1117/12.777958
Data Mining
Proc. SPIE 6973, Is mining of knowledge possible?, 697307 (17 March 2008); doi: 10.1117/12.774079
Proc. SPIE 6973, Application of data mining to medical risk management, 697308 (17 March 2008); doi: 10.1117/12.778471
Proc. SPIE 6973, A data mining approach to intelligence operations, 697309 (17 March 2008); doi: 10.1117/12.780835
Proc. SPIE 6973, The epidemic threshold theorem with social and contact heterogeneity, 69730A (17 March 2008); doi: 10.1117/12.777420
Proc. SPIE 6973, Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing, 69730B (17 March 2008); doi: 10.1117/12.777421
Intrusion Detection
Proc. SPIE 6973, Intrusion signature creation via clustering anomalies, 69730C (17 March 2008); doi: 10.1117/12.775886
Proc. SPIE 6973, Securing MANETs with BITSI: danger theory and mission continuity, 69730D (17 March 2008); doi: 10.1117/12.777756
Proc. SPIE 6973, Virtual terrain: a security-based representation of a computer network, 69730E (17 March 2008); doi: 10.1117/12.776980
Proc. SPIE 6973, VTAC: virtual terrain assisted impact assessment for cyber attacks, 69730F (17 March 2008); doi: 10.1117/12.777291
Proc. SPIE 6973, Usefulness of DARPA dataset for intrusion detection system evaluation, 69730G (17 March 2008); doi: 10.1117/12.777341
Miscellaneous Topics
Proc. SPIE 6973, Performance comparison of the automatic data reduction system (ADRS), 69730H (17 March 2008); doi: 10.1117/12.777903
Proc. SPIE 6973, Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement, 69730I (17 March 2008); doi: 10.1117/12.777652
Proc. SPIE 6973, Adaptive Markov feature estimation and categorization using the projection-slice theorem, 69730J (17 March 2008); doi: 10.1117/12.777411
Miscellaneous Applications
Proc. SPIE 6973, A new approach to chemical agent detection, classification, and estimation, 69730K (17 March 2008); doi: 10.1117/12.778501
Proc. SPIE 6973, Using received signal strength variation for surveillance in residential areas, 69730L (17 March 2008); doi: 10.1117/12.778008
Proc. SPIE 6973, Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition, 69730M (17 March 2008); doi: 10.1117/12.777627
Proc. SPIE 6973, Improvement in minority attack detection with skewness in network traffic, 69730N (17 March 2008); doi: 10.1117/12.785623
Poster Session
Proc. SPIE 6973, An improved clone selection immune algorithm, 69730O (17 March 2008); doi: 10.1117/12.772464
Proc. SPIE 6973, An immunity-based model for dynamic distributed intrusion detection, 69730P (17 March 2008); doi: 10.1117/12.772250
Proc. SPIE 6973, Research on parallel algorithm for sequential pattern mining, 69730Q (17 March 2008); doi: 10.1117/12.775402
Back to Top