PROCEEDINGS VOLUME 6973
SPIE DEFENSE AND SECURITY SYMPOSIUM | 16-20 MARCH 2008
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
Editor Affiliations +
IN THIS VOLUME

7 Sessions, 26 Papers, 0 Presentations
Data Mining  (5)
Proceedings Volume 6973 is from: Logo
SPIE DEFENSE AND SECURITY SYMPOSIUM
16-20 March 2008
Orlando, Florida, United States
Front Matter: Volume 6973
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697301 (2008) https://doi.org/10.1117/12.795156
Information Assurance and Security
George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa Marvel
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697302 (2008) https://doi.org/10.1117/12.777135
Martin R. Stytz, Sheila B. Banks
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697303 (2008) https://doi.org/10.1117/12.778006
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697304 (2008) https://doi.org/10.1117/12.770415
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697305 (2008) https://doi.org/10.1117/12.775781
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697306 (2008) https://doi.org/10.1117/12.777958
Data Mining
Jim Brander, Alex Lupu
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697307 (2008) https://doi.org/10.1117/12.774079
Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697308 (2008) https://doi.org/10.1117/12.778471
Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697309 (2008) https://doi.org/10.1117/12.780835
Doracelly Hincapié Palacio, Juan Ospina Giraldo, Rubén Darío Gómez Arias
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730A (2008) https://doi.org/10.1117/12.777420
Li-li Tang, Sheng-jie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730B (2008) https://doi.org/10.1117/12.777421
Intrusion Detection
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730C (2008) https://doi.org/10.1117/12.775886
Marco Carvalho, Richard Ford, William Allen, Gerald Marin
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730D (2008) https://doi.org/10.1117/12.777756
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730E (2008) https://doi.org/10.1117/12.776980
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730F (2008) https://doi.org/10.1117/12.777291
Ciza Thomas, Vishwas Sharma, N. Balakrishnan
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730G (2008) https://doi.org/10.1117/12.777341
Miscellaneous Topics
Dan Patterson, David Turner, Arturo Concepcion, Robert Lynch
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730H (2008) https://doi.org/10.1117/12.777903
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730I (2008) https://doi.org/10.1117/12.777652
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730J (2008) https://doi.org/10.1117/12.777411
Miscellaneous Applications
Tao Qian, Genshe Chen, Erik Blasch, Robert Lynch, Yongwei Qi
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730K (2008) https://doi.org/10.1117/12.778501
Sajid Hussain, Richard Peters, Daniel L. Silver
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730L (2008) https://doi.org/10.1117/12.778008
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730M (2008) https://doi.org/10.1117/12.777627
Ciza Thomas, N. Balakrishnan
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730N (2008) https://doi.org/10.1117/12.785623
Poster Session
Peili Qiao, Tong Wang, Jie Su
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730O (2008) https://doi.org/10.1117/12.772464
Peili Qiao, Tong Wang, Jie Su
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730P (2008) https://doi.org/10.1117/12.772250
Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 69730Q (2008) https://doi.org/10.1117/12.775402
Back to Top