PROCEEDINGS VOLUME 7344
SPIE DEFENSE, SECURITY, AND SENSING | 13-17 APRIL 2009
Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009
Editor Affiliations +
Proceedings Volume 7344 is from: Logo
SPIE DEFENSE, SECURITY, AND SENSING
13-17 April 2009
Orlando, Florida, United States
Front Matter: Volume 7344
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734401 (2009) https://doi.org/10.1117/12.829106
Intrusion Detection and Network Security I
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734402 (2009) https://doi.org/10.1117/12.818142
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734403 (2009) https://doi.org/10.1117/12.818997
Munesh Kumar, Shoaib Siddique, Humera Noor
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734404 (2009) https://doi.org/10.1117/12.820000
Intrusion Detection and Network Security II
S. Vimalathithan, S. D. Sudarsan, R. Seker, R. B. Lenin, S. Ramaswamy
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734405 (2009) https://doi.org/10.1117/12.818575
Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco Carvalho, William Allen
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734406 (2009) https://doi.org/10.1117/12.818894
Alejandra López-Caloca, Elvia Martínez-Viveros, José Ignacio Chapela-Castañares
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734407 (2009) https://doi.org/10.1117/12.818911
Data Mining and Classification I
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734408 (2009) https://doi.org/10.1117/12.819067
Holger Jaenisch, James Handley, Nathaniel Albritton, David Whitener, Randel Burnett, Robert Caspers, Stephen Moren, Thomas Alexander, William Maddox III, et al.
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 734409 (2009) https://doi.org/10.1117/12.817863
Data Mining and Classification II
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440A (2009) https://doi.org/10.1117/12.819440
André R. A. Grégio, Isabela L. Oliveira, Rafael D. C. Santos, Adriano M. Cansian, Paulo L. de Geus
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440B (2009) https://doi.org/10.1117/12.818310
Peter Schallauer, Werner Bailer, Albert Hofmann, Roland Mörzinger
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440C (2009) https://doi.org/10.1117/12.818481
Miscellaneous Applications: Issues and Innovations I
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440D (2009) https://doi.org/10.1117/12.820319
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440E (2009) https://doi.org/10.1117/12.820420
Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440F (2009) https://doi.org/10.1117/12.814986
Sajid Hussain, Md Shafayat Rahman
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440G (2009) https://doi.org/10.1117/12.824207
Miscellaneous Applications: Issues and Innovations II
Martin R. Stytz, Sheila B. Banks
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440H (2009) https://doi.org/10.1117/12.818364
Richard J. Hummel, Errin W. Fulp
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440I (2009) https://doi.org/10.1117/12.818389
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440J (2009) https://doi.org/10.1117/12.820513
Martin R. Stytz, Michael May, Sheila B. Banks
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440K (2009) https://doi.org/10.1117/12.819535
Poster Session
Shuqing Peng, Huining Duan, Deyun Chen
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440L (2009) https://doi.org/10.1117/12.816355
Lijuan Zhou, Minhua Wu, Shuang Li
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440M (2009) https://doi.org/10.1117/12.816443
Lijuan Zhou, Min Xu, Zhang Zhang, Luping Duan
Proceedings Volume Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 73440N (2009) https://doi.org/10.1117/12.817348
Back to Top