Abstract is missing.
- Threshold-based clustering for intrusion detection systemsVladimir Nikulin. [doi]
- Distributed intrusion detection system based on fuzzy rulesPei-Li Qiao, Jie Su, Ya-Hui Liu. [doi]
- Detecting people of interest from internet data sourcesRaymond A. Cardillo, John J. Salerno. [doi]
- Data modeling for predictive behavior hypothesis formation and testingHolger Jaenisch, James W. Handley, Marvin H. Barnett, Richard Esslinger, David A. Grover, Jeffrey P. Faucheux, Kenneth Lamkin. [doi]
- Distinguishing false from true alerts in Snort by data mining patterns of alertsJidong Long, Daniel G. Schwartz, Sara Stoecklin. [doi]
- Mining security events in a distributed agent societyDipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran. [doi]
- A novel unsupervised anomaly detection based on robust principal component classifierWenbin Qiu, Yu Wu, Guoyin Wang, Simon X. Yang, Jie Bai, Jieying Li. [doi]
- A novel interacting multiple model based network intrusion detection schemeRuichi Xin, Vijayaraghavan Venkatasubramanian, Henry Leung. [doi]
- Broad frequency acoustic response of ground/floor to human footstepsAlexander Ekimov, James M. Sabatier. [doi]
- A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithmsVladimir G. Krasilenko, Vitaliy F. Bardachenko, Alexander I. Nikolsky, Alexander A. Lazarev, Konstantin V. Ogorodnik. [doi]
- A novel mark embedding and attack identifying technique for watermarkingQiwei Lin, Gui Feng. [doi]
- Mining emotional profiles using e-mail messages for earlier warnings of potential terrorist activitiesBoris Galitsky, Boris Kovalerchuk. [doi]
- AINIDS: an immune-based network intrusion detection systemQiao Yan, Jianping Yu. [doi]
- AutoCorrel: a neural network event correlation approachMaxwell G. Dondo, Nathalie Japkowicz, Reuben Smith. [doi]
- Damage assessment of mission essential buildings based on simulation studies of low yield explosivesThomas G. L. Allen. [doi]
- End-to-end communications securityKevin J. Kumpf. [doi]
- Dimensional reduction of web traffic dataVladimir Nikulin. [doi]
- Clustering method via independent components for semi-structured documentsTong Wang, Da-xin Liu, Xuan-Zuo Lin, Wei Sun 0005. [doi]
- Extending key sharing: how to generate a key tightly coupled to a network security policyMatheos Kazantzidis. [doi]
- An implementation-independent threat model for group communicationsJason Hester, William Yurcik, Roy H. Campbell. [doi]
- Web-based dynamic Delphi: a new survey instrumentJingtao Yao, Wei-Ning Liu. [doi]
- Visualization of similarities and dissimilarities in rules using MDSShusaku Tsumoto. [doi]
- Mining hospital management dataShusaku Tsumoto, Yuko Tsumoto. [doi]
- Attribute selection using information gain for a fuzzy logic intrusion detection systemJesús González-Pino, Janica Edmonds, Mauricio Papa. [doi]
- An algorithmic approach to mining unknown clusters in training dataRobert S. Lynch Jr., Peter K. Willett. 624101 [doi]
- Efficient mining of strongly correlated item pairsShuxin Li, Robert Lee, Sheau-Dong Lang. 624102 [doi]
- Genetic program based data mining to reverse engineer digital logicJames F. Smith III, ThanhVu H. Nguyen. 624103 [doi]
- Database architecture for data mining to aid real-time range safety decision in a test rangeA. K. Checker, R. Appavu Raj. 624104 [doi]
- Granular computing for data miningYiyu Yao. 624105 [doi]
- How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domainsWilliam G. Perry. 624106 [doi]
- Personal privacy, information assurance, and the threat posed by malware techologyMartin R. Stytz, Sheila B. Banks. 624107 [doi]
- Energy efficient link layer security solution for wireless LANsSuat Özdemir. 624108 [doi]
- Image sensor for security applications with on-chip data authenticationPeter Stifter, Kurt Eberhardt, Arnold Erni, Karl Hofmann. 624109 [doi]
- The design and application of data warehouse during modern enterprises environmentLijuan Zhou, Chi Liu, Chunying Wang. 624110 [doi]
- A practical timing attack on RSA over a LANMark Lodato, Ismail Jouny. 624111 [doi]