Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dmkdttt/dmidisadns2009.bht:"
@inproceedings{DBLP:conf/dmkdttt/0084M09, author = {Wei Wang and Hong Man}, editor = {Belur V. Dasarathy}, title = {Exploring social relations for the intrusion detection in ad hoc networks}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734402}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818142}, doi = {10.1117/12.818142}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/0084M09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/AbeT09, author = {Hidenao Abe and Shusaku Tsumoto}, editor = {Belur V. Dasarathy}, title = {A method to characterize dataset based on objective rule evaluation indices}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440D}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.820319}, doi = {10.1117/12.820319}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/AbeT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/FanWNKG09, author = {Jieyan Fan and Dapeng Wu and Antonio Nucci and Ram Keralapura and Lixin Gao}, editor = {Belur V. Dasarathy}, title = {Identifying hidden voice and video streams}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440F}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.814986}, doi = {10.1117/12.814986}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/FanWNKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/GregioOSCG09, author = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and Isabela L. Oliveira and Rafael D. C. Santos and Adriano M. Cansian and Paulo L. de Geus}, editor = {Belur V. Dasarathy}, title = {Malware distributed collection and pre-classification system using honeypot technology}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440B}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818310}, doi = {10.1117/12.818310}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/GregioOSCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HarrisAS09, author = {Alan Harris and Mouhamad K. Al Akkoumi and James J. Sluss Jr.}, editor = {Belur V. Dasarathy}, title = {A comparison of passive optical network security}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734403}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818997}, doi = {10.1117/12.818997}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/HarrisAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HummelF09, author = {Richard J. Hummel and Errin W. Fulp}, editor = {Belur V. Dasarathy}, title = {High-speed packet filtering utilizing stream processors}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440I}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818389}, doi = {10.1117/12.818389}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/HummelF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/HussainR09, author = {Sajid Hussain and Md. Shafayat Rahman}, editor = {Belur V. Dasarathy}, title = {Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440G}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.824207}, doi = {10.1117/12.824207}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/HussainR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHAWBCMA09, author = {Holger Jaenisch and James W. Handley and Nathaniel Albritton and David Whitener and Randel Burnett and Robert Caspers and Stephen Moren and Thomas Alexander and William Maddox III and William Albritton Jr.}, editor = {Belur V. Dasarathy}, title = {Autonomous journaling response using data model {LUTS}}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734409}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.817863}, doi = {10.1117/12.817863}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHAWBCMA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/KumarSN09, author = {Munesh Kumar and Shoaib Siddique and Humera Noor}, editor = {Belur V. Dasarathy}, title = {Feature-based alert correlation in security systems using self organizing maps}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734404}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.820000}, doi = {10.1117/12.820000}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/KumarSN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LancrenonGF09, author = {Jean Lancrenon and Roland Gillard and Thierry Fournel}, editor = {Belur V. Dasarathy}, title = {Remote object authentication: confidence model, cryptosystem and protocol}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440J}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.820513}, doi = {10.1117/12.820513}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LancrenonGF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Lopez-CalocaMC09, author = {Alejandra L{\'{o}}pez{-}Caloca and Elvia Mart{\'{\i}}nez{-}Viveros and Jos{\'{e}} Ignacio Chapela{-}Casta{\~{n}}ares}, editor = {Belur V. Dasarathy}, title = {Application of a clustering-remote sensing method in analyzing security patterns}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734407}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818911}, doi = {10.1117/12.818911}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dmkdttt/Lopez-CalocaMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/LynchW09, author = {Robert S. Lynch Jr. and Peter K. Willett}, editor = {Belur V. Dasarathy}, title = {Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classification}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734408}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.819067}, doi = {10.1117/12.819067}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/LynchW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/OndiHPFCA09, author = {Attila Ondi and Katherine Hoffman and Carlos Perez and Richard Ford and Marco M. Carvalho and William H. Allen}, editor = {Belur V. Dasarathy}, title = {Security in MANETs using reputation-adjusted routing}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734406}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818894}, doi = {10.1117/12.818894}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/OndiHPFCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/PengDC09, author = {Shu{-}qing Peng and Huining Duan and Deyun Chen}, editor = {Belur V. Dasarathy}, title = {Design and implementation of workflow engine for service-oriented architecture}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440L}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.816355}, doi = {10.1117/12.816355}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/PengDC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/Riasati09, author = {Vahid R. Riasati}, editor = {Belur V. Dasarathy}, title = {Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fields}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440E}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.820420}, doi = {10.1117/12.820420}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/Riasati09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SchallauerBHM09, author = {Peter Schallauer and Werner Bailer and Albert Hofmann and Roland M{\"{o}}rzinger}, editor = {Belur V. Dasarathy}, title = {{SAM:} an interoperable metadata model for multimodal surveillance applications}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440C}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818481}, doi = {10.1117/12.818481}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SchallauerBHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StytzB09, author = {Martin R. Stytz and Sheila B. Banks}, editor = {Belur V. Dasarathy}, title = {Considerations and foundations for Botnet simulation}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440H}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818364}, doi = {10.1117/12.818364}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StytzB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/StytzMB09, author = {Martin R. Stytz and Michael May and Sheila B. Banks}, editor = {Belur V. Dasarathy}, title = {Recognition and categorization considerations for information assurance requirements development and speficication}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440K}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.819535}, doi = {10.1117/12.819535}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/StytzMB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/SubramanianSSLR09, author = {Vimalathithan Subramanian and Sithu D. Sudarsan and Remzi Seker and Rathinasamy B. Lenin and Srinivasan Ramaswamy}, editor = {Belur V. Dasarathy}, title = {Secure data aggregation in heterogeneous and disparate networks using stand off server architecture}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734405}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.818575}, doi = {10.1117/12.818575}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/SubramanianSSLR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/TsumotoH09, author = {Shusaku Tsumoto and Shoji Hirano}, editor = {Belur V. Dasarathy}, title = {Temporal data mining for hospital management}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440A}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.819440}, doi = {10.1117/12.819440}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/TsumotoH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ZhouWL09, author = {Lijuan Zhou and Minhua Wu and Shuang Li}, editor = {Belur V. Dasarathy}, title = {Design of data warehouse in teaching state based on {OLAP} and data mining}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440M}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.816443}, doi = {10.1117/12.816443}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ZhouWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/ZhouXZD09, author = {Lijuan Zhou and Min Xu and Zhang Zhang and Luping Duan}, editor = {Belur V. Dasarathy}, title = {Classification data mining method based on dynamic {RBF} neural networks}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {73440N}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.817348}, doi = {10.1117/12.817348}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/ZhouXZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dmkdttt/2009, editor = {Belur V. Dasarathy}, title = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, publisher = {{SPIE}}, year = {2009}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=7344}, isbn = {978-0-8194-7610-4}, timestamp = {Wed, 29 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.