![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2005
- Yao Li, Zhitang Li, Hao Tu:
Dynamic immune intrusion detection system for IPv6. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 374- - Sheila B. Banks, Martin R. Stytz:
A taxonomy and discussion of software attack technologies. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 92-101 - Abdelghani Bellaachia, Rajat Bhatt:
An enhanced stream mining approach for network anomaly detection. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 342-351 - David P. Benjamin, Ranjita Shankar-Iyer, Archana Perumal:
VMSoar: a cognitive agent for network security. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 72-80 - David P. Benjamin, Adrian Walker:
Semantic encoding of relational databases in wireless networks. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 255-262 - Dongming Cai, James Theiler, Maya B. Gokhale:
Detecting a malicious executable without prior knowledge of its patterns. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 1-12 - Raymond A. Cardillo, John J. Salerno:
The pearls of using real-world evidence to discover social groups. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 309-320 - Deyun Chen, Shujun Pei, Zhiying Quan:
Knowledge base system visualization reasoning model based on ICON. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 352-355 - Dipankar Dasgupta, José M. Rodríguez, Sankalp Balachandran:
Efficient visualization of security events in a large agent society. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 102-113 - Yaping Deng, Wei Zhang:
A new method for MPLS-based recovery. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 364-373 - Rodolfo A. Fiorini
, Gianfranco Dacquino:
Improved object optimal synthetic description, modeling, learning, and discrimination by GEOGINE computational kernel. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 214-225 - Yongjun Hai, Yu Wu, Guoyin Wang
:
An improved unsupervised clustering-based intrusion detection method. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 52-60 - Shoji Hirano, Shusaku Tsumoto:
Classification of temporal sequences using multiscale matching and rough clustering. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 202-213 - Holger Jaenisch, James W. Handley, Jeffrey P. Faucheux, Ken Lamkin:
Shai-Hulud: The quest for worm sign. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 321-329 - Rashid Hafeez Khokhar, Mohd. Noor Md. Sap:
Predictive fuzzy reasoning method for time series stock market data mining. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 243-254 - Walker H. Land Jr., Mark J. Embrechts, Frances R. Anderson, Tom Smith, Lut Wong, Stephen Fahlbusch, Robert Choma:
Integrating knowledge representation/engineering, the multivariant PNN, and machine learning to improve breast cancer diagnosis. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 226-231 - Ching-Cheng Lee, Rashmi Prabhakara:
Web image retrieval using an effective topic and content-based technique. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 303-308 - Danzhou Liu, Charles E. Hughes
:
Deducing behaviors from primitive movement attributes. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 180-189 - Yu Liu, Hong Man:
Network vulnerability assessment using Bayesian networks. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 61-71 - Robert S. Lynch Jr., Peter K. Willett
:
Utilizing unsupervised learning to cluster data in the Bayesian data reduction algorithm. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 158-167 - Vladimir Nikulin, Alexander J. Smola:
Parametric model-based clustering. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 190-201 - Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 13-22 - Chandra Pandey:
Deducing trapdoor primitives in public key encryption schemes. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 81-91 - Peili Qiao, Jie Su, Chengwei Sun:
Distributed intrusion detection system based on ARTIS. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 356-363 - John J. Salerno, Raymond A. Cardillo, Zhongfei (Mark) Zhang:
Comparing various algorithms for discovering social groups with uni-party data. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 168-179 - James F. Smith III, ThanhVu H. Nguyen:
Data-mining-based automated reverse engineering and defect discovery. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 232-242 - Martin R. Stytz, Sheila B. Banks:
Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 130-141 - Moises Sudit, Adam Stotz, Michael Holender:
Situational awareness of a coordinated cyber attack. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 114-129 - Shusaku Tsumoto:
Granularity and statistical independence in a contingency table. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 330-341 - Shusaku Tsumoto, Shoji Hirano:
On statistical independence of a contingency matrix. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 291-302
skipping 9 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-06 01:44 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint