Secure interoperation for effective data mining in border control and homeland security applications
暂无分享,去创建一个
Vijayalakshmi Atluri | Robert Grossman | Janice Warner | Nabil R. Adam | Rey Koslowski | Vandana Pursnani Janeja | N. Adam | V. Atluri | V. Janeja | Janice Warner | R. Grossman | Rey Koslowski
[1] Vijayalakshmi Atluri,et al. Collusion Set Detection Through Outlier Discovery , 2005, ISI.
[2] Robert L. Grossman,et al. GenIc: A Single-Pass Generalized Incremental Algorithm for Clustering , 2004, SDM.
[3] Rey Koslowski. REAL CHALLENGES FOR VIRTUAL BORDERS , 2005 .
[4] Vijayalakshmi Atluri,et al. A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions , 2004, IICIS.
[5] Vijayalakshmi Atluri,et al. LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows , 2005, SAC '05.
[6] Dallas D. Owens. Beyond the U.S. War on Terrorism: Comparing Domestic Legal Remedies to an International Dilemma , 2005 .
[7] Robert L. Grossman,et al. Real Time Change Detection and Alerts from Highway Traffic Data , 2005, ACM/IEEE SC 2005 Conference (SC'05).
[8] Vijayalakshmi Atluri,et al. Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.
[9] Vijayalakshmi Atluri,et al. Supporting conditional delegation in secure workflow management systems , 2005, SACMAT '05.
[10] Vijayalakshmi Atluri,et al. Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations , 2004, DG.O.
[11] R. Grossman,et al. Graph-theoretic scagnostics , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..
[12] Vijayalakshmi Atluri,et al. Automatic Enforcement of Access Control Policies Among Dynamic Coalitions , 2004, ICDCIT.
[13] Vasileios Hatzivassiloglou,et al. An Automatic Method for Constructing Domain-Specific Ontology Resources , 2004, LREC.
[14] Vijayalakshmi Atluri,et al. FS/sup 3/: a random walk based free-form spatial scan statistic for anomalous window detection , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[15] Tao Lin,et al. DM-AMS: employing data mining techniques for alert management , 2005, DG.O.
[16] Vijayalakshmi Atluri,et al. An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies , 2005, ICISS.
[17] Rey Koslowski,et al. International Cooperation to Create Smart Borders , 2004 .
[18] Vijayalakshmi Atluri,et al. A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions , 2005, DBSec.
[19] Rey Koslowski. International Cooperation on Electronic Advanced Passenger Information Transfer and Passport Biometrics , 2004 .