Apply game theory and probing to extract information from semi-trustworthy partners ... Every 200 rounds, we create a new generation of agents, using the most ...
Data Mining for Security Applications: Detecting Malicious Executables Mr. Mehedy M. Masud (PhD Student) Prof. Latifur Khan Prof. Bhavani Thuraisingham
Vision for Secure Geospatial Semantic Web Technology Stack for Secure Geospatial Semantic Web GRDF Geospatial RDF (developed at the University of Texas at Dallas, ...
GRDF-based Semantic Dataset Development with NCTCOG datasets and E-Plan ... Time-critical objectives ... Information is only made available to authorized individuals ...
tuple (idi, Si, Ei, Vi, Ai) -Idi is an object identifier which is unique -Si is the start time ... Ai is simply audio recording for that time period. Ex- {10, ...
Create a machine-understandable model of existing social networks ... Social Networks. Individuals engaged in suspicious or undesirable behavior rarely act alone ...
Extract important features from the assembly program. Combine with machine-code features ... Features are extracted from the byte codes in the form of n-grams, ...
... reduced sensitivity to actor (e.g. clothing or skin tone) or background lighting ... left-to-right) and with reduced sensitivity to spatial variations (Clothing) ...
Security Theory and Protocols. Secure group communication. Security Engineering ... Assured Information Sharing. Secure Semantic Web Technologies. Social Networks ...
Tiger Woods' (People), palm(tree), building, grass, golf, sky ... Tiger, grass. Motivation for KBIAR. There is a gap between perceptual issue and conceptual issue. ...
Mark Pollitt has stated that digital forensics is not an elephant, it is a ... In fact, many digital forensics investigation processes and tasks were defined ...
Kobe Bryant' scores 21 points as the 'Lakers' remain perfect on their eastern ... lakers', 'BryantKobe' we select the 'kobe bryant' concept and other concepts are ...
Cascading spatio-temporal pattern discovery: A summary of results Pradeep Mohan , Shashi Shekhar , James A.Shine , James P.Rogers2 University of Minnesota, Twin ...
Data Mining for Malicious Code Detection and Security Applications. Prof. Bhavani Thuraisingham ... Detect Malicious code by program slicing. requires analysis. 27 ...
Dilsad Cavus (MS, Data mining and data sharing) Srinivasan Iyer (MS, Trust ... Virus, Exploit, Denial of Service (DoS), Flooder, Sniffer, Spoofer, Trojan etc. ...