Search dblp for Publications

export results for "toc:db/conf/dmkdttt/dmidisadns2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dmkdttt/0084M09,
  author       = {Wei Wang and
                  Hong Man},
  editor       = {Belur V. Dasarathy},
  title        = {Exploring social relations for the intrusion detection in ad hoc networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734402},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818142},
  doi          = {10.1117/12.818142},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/0084M09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/AbeT09,
  author       = {Hidenao Abe and
                  Shusaku Tsumoto},
  editor       = {Belur V. Dasarathy},
  title        = {A method to characterize dataset based on objective rule evaluation
                  indices},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440D},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.820319},
  doi          = {10.1117/12.820319},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/AbeT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/FanWNKG09,
  author       = {Jieyan Fan and
                  Dapeng Wu and
                  Antonio Nucci and
                  Ram Keralapura and
                  Lixin Gao},
  editor       = {Belur V. Dasarathy},
  title        = {Identifying hidden voice and video streams},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440F},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.814986},
  doi          = {10.1117/12.814986},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/FanWNKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/GregioOSCG09,
  author       = {Andr{\'{e}} Ricardo Abed Gr{\'{e}}gio and
                  Isabela L. Oliveira and
                  Rafael D. C. Santos and
                  Adriano M. Cansian and
                  Paulo L. de Geus},
  editor       = {Belur V. Dasarathy},
  title        = {Malware distributed collection and pre-classification system using
                  honeypot technology},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440B},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818310},
  doi          = {10.1117/12.818310},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/GregioOSCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HarrisAS09,
  author       = {Alan Harris and
                  Mouhamad K. Al Akkoumi and
                  James J. Sluss Jr.},
  editor       = {Belur V. Dasarathy},
  title        = {A comparison of passive optical network security},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734403},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818997},
  doi          = {10.1117/12.818997},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HarrisAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HummelF09,
  author       = {Richard J. Hummel and
                  Errin W. Fulp},
  editor       = {Belur V. Dasarathy},
  title        = {High-speed packet filtering utilizing stream processors},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440I},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818389},
  doi          = {10.1117/12.818389},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HummelF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/HussainR09,
  author       = {Sajid Hussain and
                  Md. Shafayat Rahman},
  editor       = {Belur V. Dasarathy},
  title        = {Using received signal strength indicator to detect node replacement
                  and replication attacks in wireless sensor networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440G},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.824207},
  doi          = {10.1117/12.824207},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/HussainR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/JaenischHAWBCMA09,
  author       = {Holger Jaenisch and
                  James W. Handley and
                  Nathaniel Albritton and
                  David Whitener and
                  Randel Burnett and
                  Robert Caspers and
                  Stephen Moren and
                  Thomas Alexander and
                  William Maddox III and
                  William Albritton Jr.},
  editor       = {Belur V. Dasarathy},
  title        = {Autonomous journaling response using data model {LUTS}},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734409},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.817863},
  doi          = {10.1117/12.817863},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/JaenischHAWBCMA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/KumarSN09,
  author       = {Munesh Kumar and
                  Shoaib Siddique and
                  Humera Noor},
  editor       = {Belur V. Dasarathy},
  title        = {Feature-based alert correlation in security systems using self organizing
                  maps},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734404},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.820000},
  doi          = {10.1117/12.820000},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/KumarSN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LancrenonGF09,
  author       = {Jean Lancrenon and
                  Roland Gillard and
                  Thierry Fournel},
  editor       = {Belur V. Dasarathy},
  title        = {Remote object authentication: confidence model, cryptosystem and protocol},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440J},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.820513},
  doi          = {10.1117/12.820513},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LancrenonGF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Lopez-CalocaMC09,
  author       = {Alejandra L{\'{o}}pez{-}Caloca and
                  Elvia Mart{\'{\i}}nez{-}Viveros and
                  Jos{\'{e}} Ignacio Chapela{-}Casta{\~{n}}ares},
  editor       = {Belur V. Dasarathy},
  title        = {Application of a clustering-remote sensing method in analyzing security
                  patterns},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734407},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818911},
  doi          = {10.1117/12.818911},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Lopez-CalocaMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/LynchW09,
  author       = {Robert S. Lynch Jr. and
                  Peter K. Willett},
  editor       = {Belur V. Dasarathy},
  title        = {Estimating the threshold for maximizing expected gain in supervised
                  discrete Bayesian classification},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734408},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.819067},
  doi          = {10.1117/12.819067},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/LynchW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/OndiHPFCA09,
  author       = {Attila Ondi and
                  Katherine Hoffman and
                  Carlos Perez and
                  Richard Ford and
                  Marco M. Carvalho and
                  William H. Allen},
  editor       = {Belur V. Dasarathy},
  title        = {Security in MANETs using reputation-adjusted routing},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734406},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818894},
  doi          = {10.1117/12.818894},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/OndiHPFCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/PengDC09,
  author       = {Shu{-}qing Peng and
                  Huining Duan and
                  Deyun Chen},
  editor       = {Belur V. Dasarathy},
  title        = {Design and implementation of workflow engine for service-oriented
                  architecture},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440L},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.816355},
  doi          = {10.1117/12.816355},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/PengDC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/Riasati09,
  author       = {Vahid R. Riasati},
  editor       = {Belur V. Dasarathy},
  title        = {Adaptation of the projection-slice theorem for stock valuation estimation
                  using random Markov fields},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440E},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.820420},
  doi          = {10.1117/12.820420},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/Riasati09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SchallauerBHM09,
  author       = {Peter Schallauer and
                  Werner Bailer and
                  Albert Hofmann and
                  Roland M{\"{o}}rzinger},
  editor       = {Belur V. Dasarathy},
  title        = {{SAM:} an interoperable metadata model for multimodal surveillance
                  applications},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440C},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818481},
  doi          = {10.1117/12.818481},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SchallauerBHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StytzB09,
  author       = {Martin R. Stytz and
                  Sheila B. Banks},
  editor       = {Belur V. Dasarathy},
  title        = {Considerations and foundations for Botnet simulation},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440H},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818364},
  doi          = {10.1117/12.818364},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StytzB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/StytzMB09,
  author       = {Martin R. Stytz and
                  Michael May and
                  Sheila B. Banks},
  editor       = {Belur V. Dasarathy},
  title        = {Recognition and categorization considerations for information assurance
                  requirements development and speficication},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440K},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.819535},
  doi          = {10.1117/12.819535},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/StytzMB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/SubramanianSSLR09,
  author       = {Vimalathithan Subramanian and
                  Sithu D. Sudarsan and
                  Remzi Seker and
                  Rathinasamy B. Lenin and
                  Srinivasan Ramaswamy},
  editor       = {Belur V. Dasarathy},
  title        = {Secure data aggregation in heterogeneous and disparate networks using
                  stand off server architecture},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {734405},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.818575},
  doi          = {10.1117/12.818575},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/SubramanianSSLR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/TsumotoH09,
  author       = {Shusaku Tsumoto and
                  Shoji Hirano},
  editor       = {Belur V. Dasarathy},
  title        = {Temporal data mining for hospital management},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440A},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.819440},
  doi          = {10.1117/12.819440},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/TsumotoH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ZhouWL09,
  author       = {Lijuan Zhou and
                  Minhua Wu and
                  Shuang Li},
  editor       = {Belur V. Dasarathy},
  title        = {Design of data warehouse in teaching state based on {OLAP} and data
                  mining},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440M},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.816443},
  doi          = {10.1117/12.816443},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ZhouWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmkdttt/ZhouXZD09,
  author       = {Lijuan Zhou and
                  Min Xu and
                  Zhang Zhang and
                  Luping Duan},
  editor       = {Belur V. Dasarathy},
  title        = {Classification data mining method based on dynamic {RBF} neural networks},
  booktitle    = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  pages        = {73440N},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {https://doi.org/10.1117/12.817348},
  doi          = {10.1117/12.817348},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/ZhouXZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dmkdttt/2009,
  editor       = {Belur V. Dasarathy},
  title        = {Data Mining, Intrusion Detection, Information Security and Assurance,
                  and Data Networks Security 2009, 13 April 2009, Orlando, Florida,
                  {USA}},
  series       = {{SPIE} Proceedings},
  volume       = {7344},
  publisher    = {{SPIE}},
  year         = {2009},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=7344},
  isbn         = {978-0-8194-7610-4},
  timestamp    = {Wed, 29 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dmkdttt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics