-
1
-
-
85055224488
-
Web Data Mining Technologies and Their Applications in Business Intelligence and Counter- terrorism
-
FL
-
Thuraisingham, B., "Web Data Mining Technologies and Their Applications in Business Intelligence and Counter- terrorism", CRC Press, FL, 2003.
-
(2003)
CRC Press
-
-
Thuraisingham, B.1
-
2
-
-
0033336136
-
Distributed Data Mining in Credit Card Fraud Detection
-
Chan, P, et al, "Distributed Data Mining in Credit Card Fraud Detection", IEEE Intelligent Systems, 14 (6), 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
-
-
Chan, P.1
-
3
-
-
63149097958
-
-
Lazarevic, A., et al., Data Mining for Computer Security Applications, Tutorial Proc. IEEE Data Mining Conference, 2003.
-
Lazarevic, A., et al., "Data Mining for Computer Security Applications", Tutorial Proc. IEEE Data Mining Conference, 2003.
-
-
-
-
4
-
-
63149120650
-
-
Thuraisingham, B., Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges, Kluwer, MA 2004 (Editors: V. Kumar et al).
-
Thuraisingham, B., "Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges", Kluwer, MA 2004 (Editors: V. Kumar et al).
-
-
-
-
5
-
-
85055556304
-
Database and Applications Security
-
Thuraisingham B., "Database and Applications Security", CRC Press, 2005.
-
(2005)
CRC Press
-
-
Thuraisingham, B.1
-
6
-
-
63149193919
-
Data Miming, Privacy, Civil Liberties and National Security
-
Thuraisingham B., "Data Miming, Privacy, Civil Liberties and National Security", SIGKDD Explorations, 2002.
-
(2002)
SIGKDD Explorations
-
-
Thuraisingham, B.1
-
7
-
-
36049030250
-
A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering
-
ACM/Springer-Verlag
-
Khan, L., Awad, M. and Thuraisingham, B. "A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering", The VLDB Journal: ACM/Springer-Verlag, 16(1), page 507-521, 2007.
-
(2007)
The VLDB Journal
, vol.16
, Issue.1
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
8
-
-
38049178750
-
Feature based Techniques for Auto-detection of Novel Email Worms
-
Nanjing, China, May
-
Masud, M. M., Khan, L. and Thuraisingham, B. "Feature based Techniques for Auto-detection of Novel Email Worms", In Proc. 11 Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007), Nanjing, China, May 2007, page 205-216.
-
(2007)
Proc. 11 Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007)
, pp. 205-216
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
9
-
-
33746800235
-
Detection and Resolution of Anomalies in Firewall Policy Rules
-
Springer-Verlag, July, Sophia Antipolis, France
-
Abedin, M., Nessa, S., Khan, L., Thuraisingham, B., "Detection and Resolution of Anomalies in Firewall Policy Rules", In Proc. 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), Springer-Verlag, July 2006, Sophia Antipolis, France, page 15-29.
-
(2006)
Proc. 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006)
, pp. 15-29
-
-
Abedin, M.1
Nessa, S.2
Khan, L.3
Thuraisingham, B.4
-
10
-
-
84985954864
-
A Data Mining Technique to Detect Remote Exploits
-
Japan, Jan 27-30
-
Masud, M. M., Khan, L, Thuraisingham, B., Wang, X., Liu, P., and Zhu, S., "A Data Mining Technique to Detect Remote Exploits", In Proc. IFIP WG 11.9 International Conference on Digital Forensics, Japan, Jan 27-30, 2008.
-
(2008)
Proc. IFIP WG 11.9 International Conference on Digital Forensics
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
Wang, X.4
Liu, P.5
Zhu, S.6
-
11
-
-
78650760342
-
Peer to Peer Botnet Detection for Cyber-Security: A Data Mining Approach
-
Oak Ridge National Laboratory, Oak Ridge, TN, May 12-14
-
Masud, M. M., Gao, J., Khan, L., Han, J., Thuraisingham, B., "Peer to Peer Botnet Detection for Cyber-Security: A Data Mining Approach". In Proc. Cyber Security and Information Intelligence Research Workshop (CSIIRW 08), Oak Ridge National Laboratory, Oak Ridge, TN, May 12-14, 2008.
-
(2008)
Proc. Cyber Security and Information Intelligence Research Workshop (CSIIRW 08)
-
-
Masud, M.M.1
Gao, J.2
Khan, L.3
Han, J.4
Thuraisingham, B.5
|