Abstract is missing.
- Remote object authentication: confidence model, cryptosystem and protocolJean Lancrenon, Roland Gillard, Thierry Fournel. [doi]
- Temporal data mining for hospital managementShusaku Tsumoto, Shoji Hirano. [doi]
- Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fieldsVahid R. Riasati. [doi]
- Classification data mining method based on dynamic RBF neural networksLijuan Zhou, Min Xu, Zhang Zhang, Luping Duan. [doi]
- Identifying hidden voice and video streamsJieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao. [doi]
- Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networksSajid Hussain, Md. Shafayat Rahman. [doi]
- Malware distributed collection and pre-classification system using honeypot technologyAndré Ricardo Abed Grégio, Isabela L. Oliveira, Rafael D. C. Santos, Adriano M. Cansian, Paulo L. de Geus. [doi]
- SAM: an interoperable metadata model for multimodal surveillance applicationsPeter Schallauer, Werner Bailer, Albert Hofmann, Roland Mörzinger. [doi]
- Design of data warehouse in teaching state based on OLAP and data miningLijuan Zhou, Minhua Wu, Shuang Li. [doi]
- A method to characterize dataset based on objective rule evaluation indicesHidenao Abe, Shusaku Tsumoto. [doi]
- Considerations and foundations for Botnet simulationMartin R. Stytz, Sheila B. Banks. [doi]
- Design and implementation of workflow engine for service-oriented architectureShu-qing Peng, Huining Duan, Deyun Chen. [doi]
- Recognition and categorization considerations for information assurance requirements development and speficicationMartin R. Stytz, Michael May, Sheila B. Banks. [doi]
- High-speed packet filtering utilizing stream processorsRichard J. Hummel, Errin W. Fulp. [doi]
- Exploring social relations for the intrusion detection in ad hoc networksWei Wang 0084, Hong Man. 734402 [doi]
- A comparison of passive optical network securityAlan Harris, Mouhamad K. Al Akkoumi, James J. Sluss Jr.. 734403 [doi]
- Feature-based alert correlation in security systems using self organizing mapsMunesh Kumar, Shoaib Siddique, Humera Noor. 734404 [doi]
- Secure data aggregation in heterogeneous and disparate networks using stand off server architectureVimalathithan Subramanian, Sithu D. Sudarsan, Remzi Seker, Rathinasamy B. Lenin, Srinivasan Ramaswamy. 734405 [doi]
- Security in MANETs using reputation-adjusted routingAttila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen. 734406 [doi]
- Application of a clustering-remote sensing method in analyzing security patternsAlejandra López-Caloca, Elvia Martínez-Viveros, José Ignacio Chapela-Castañares. 734407 [doi]
- Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classificationRobert S. Lynch Jr., Peter K. Willett. 734408 [doi]
- Autonomous journaling response using data model LUTSHolger Jaenisch, James W. Handley, Nathaniel Albritton, David Whitener, Randel Burnett, Robert Caspers, Stephen Moren, Thomas Alexander, William Maddox III, William Albritton Jr.. 734409 [doi]