PROCEEDINGS VOLUME 5812
DEFENSE AND SECURITY | 28 MARCH - 1 APRIL 2005
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
Editor Affiliations +
DEFENSE AND SECURITY
28 March - 1 April 2005
Orlando, Florida, United States
Intrusion Detection Tools
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603174
Tansel Ozyer, Reda Alhajj, Ken Barker
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603273
Jing Tao Yao, Song Lun Zhao, Larry V. Saxton
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604465
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603567
Mian Zhou, Sheau-Dong Lang
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603857
Yong Jun Hai, Yu Wu, Guo Yin Wang
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603086
Vulnerability Assessment and Network Security
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604240
David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.602015
Security Issues
Sheila B. Banks, Martin R. Stytz
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603161
Dipankar Dasgupta, Jose Milet Rodriguez, Sankalp Balachandran
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603240
Moises Sudit, Adam Stotz, Michael Holender
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.606980
Martin R. Stytz, Sheila B. Banks
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603160
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604602
Vulnerability Assessment and Network Security
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.601515
Learning, Classification, and Clustering
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603522
John J. Salerno, Raymond A. Cardillo, Zhongfei Mark Zhang
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603680
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604149
Vladimir Nikulin, Alex J. Smola
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603199
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604976
Rodolfo A. Fiorini, Gianfranco Dacquino
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603560
Applications
Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Steve Fahlbusch, Robert Choma
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604575
James F. Smith III, ThanhVu H. Nguyen
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.602077
Rashid Hafeez Khokhar, Mohd Noor Md Sap
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603089
Miscellaneous Tools
David P. Benjamin, Adrian Walker
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.602013
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.596766
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604040
Security Issues
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604463
Miscellaneous Tools
Wei Xie, Feng Chu, Lipo Wang, Eng Thiam Lim
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603175
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604975
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.601946
Miscellaneous Topics
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603763
Holger M. Jaenisch, James W. Handley, Jeffery P. Faucheux, Ken Lamkin
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.603367
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.604977
Poster Session
Deyun Chen, Shujun Pei, Zhiying Quan
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.596954
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.601862
Yaping Deng, Wei Zhang
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.601902
Li Yao, Zhi-tang Li, Tu Hao
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.602039
Miscellaneous Topics
Abdelghani Bellaachia, Rajat Bhatt
Proceedings Volume Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (2005) https://doi.org/10.1117/12.611168
Back to Top