Abstract is missing.
- The epidemic threshold theorem with social and contact heterogeneityDoracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias. [doi]
- Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancementBahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead. [doi]
- Usefulness of DARPA dataset for intrusion detection system evaluationCiza Thomas, Vishwas Sharma, N. Balakrishnan 0001. [doi]
- Research on parallel algorithm for sequential pattern miningLijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao. [doi]
- Observational study of content of Hg in fog water relative to air pollution in suburbs of NanjingLili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu. [doi]
- An immunity-based model for dynamic distributed intrusion detectionPei-Li Qiao, Tong Wang, Jie Su. [doi]
- Adaptive Markov feature estimation and categorization using the projection-slice theoremVahid R. Riasati. [doi]
- Using received signal strength variation for surveillance in residential areasSajid Hussain, Richard Peters, Daniel L. Silver. [doi]
- Securing MANETs with BITSI: danger theory and mission continuityMarco Carvalho, Richard Ford, William H. Allen, Gerald A. Marin. [doi]
- Performance comparison of the automatic data reduction system (ADRS)Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr.. [doi]
- VTAC: virtual terrain assisted impact assessment for cyber attacksBrian Argauer, Shanchieh Jay Yang. [doi]
- Virtual terrain: a security-based representation of a computer networkJared Holsopple, Shanchieh Jay Yang, Brian Argauer. [doi]
- Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognitionBahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead. [doi]
- An improved clone selection immune algorithmPei-Li Qiao, Tong Wang, Jie Su. [doi]
- Improvement in minority attack detection with skewness in network trafficCiza Thomas, N. Balakrishnan 0001. [doi]
- A new approach to chemical agent detection, classification, and estimationTao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi. [doi]
- Intrusion signature creation via clustering anomaliesGilbert Hendry, Shanchieh Jay Yang. [doi]
- Integrated mandatory access control for digital dataGeorge Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel. 697302 [doi]
- Addressing security issues related to virtual institute distributed activitiesMartin R. Stytz, Sheila B. Banks. 697303 [doi]
- An innovative middle tier design for protecting federal privacy act dataThomas G. L. Allen. 697304 [doi]
- Mathematical model for security effectiveness figure of merit and its optimizationSheela V. Belur, Jonathan Gloster. 697305 [doi]
- Distributed intrusion detection system based on grid security modelJie Su, Ya-Hui Liu. 697306 [doi]
- Is mining of knowledge possible?Jim Brander, Alex Lupu. 697307 [doi]
- Application of data mining to medical risk managementShusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama. 697308 [doi]
- A data mining approach to intelligence operationsNasrullah Memon, David L. Hicks, Nicholas Harkiolakis. 697309 [doi]