21 results on '"Bhavani Thuraisingham"'
Search Results
2. Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack.
3. Hacking social network data mining.
4. Attacklets: Modeling High Dimensionality in Real World Cyberattacks.
5. Near real-time atrocity event coding.
6. Honeypot based unauthorized data access detection in MapReduce systems.
7. Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
8. Design and implementation of SNODSOC: Novel class detection for social network analysis.
9. Extraction of expanded entity phrases.
10. Identification of related information of interest across free text documents.
11. Design and implementation of a secure social network system.
12. On the mitigation of bioterrorism through game theory.
13. Social network classification incorporating link type values.
14. Simulating bioterrorism through epidemiology approximation.
15. Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping.
16. Towards cyber operations - The new role of academic cyber security research and education.
17. Unsupervised incremental sequence learning for insider threat detection.
18. Extracting semantic information structures from free text law enforcement data.
19. Assured Information Sharing Life Cycle.
20. Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic.
21. Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.