IEEE Intelligent Systems / Distribution Unlimited / aA aB aB / Morgan Kaufmann Publishers Inc. / Lincoln Labs / Adventium Labs / Scyllarus / Goldman Steven A. Harp SIFT LLC / Honeywell / Arcsight / Ryder / lB lC / /
Country
United States / United Kingdom / /
Currency
USD / / /
Holiday
Assumption / /
IndustryTerm
approaches to network / qualitative probabilistic inference networks / speed online fusion / intrusion detection systems / network intrusion detection systems / belief networks / dependency networks / pipelined systems / online documentation / expert systems / search algorithms / test network / medium-sized corporate network / speed networks / victim software / mail server / depth-first search / intrusion detection algorithms / bona fide mailing list server / individual intrusion detection systems / corporate network / network-mapping software runs / operational network / semantic web contents / done using search algorithms / /
Organization
Association for the Advancement / Attack Registry and Intelligence Service / US Federal government / Artificial Copyright Intelligence / U.S. Defense Advanced Research Projects Agency / SPAWAR Systems Center / Association for Computational Linguistics / /
Person
Dempster-Shafer Belief / /
Position
extractor / D. J. / translator / net evaluator / RT / enterprise security manager / representative / /
ProvinceOrState
N. F. / /
PublishedMedium
Computational Linguistics / IEEE Intelligent Systems / /
Technology
labeling algorithms / using search algorithms / Lua / intrusion detection algorithms / RAID / IDS algorithms / DNS / artificial intelligence / Java / http / same algorithm / list server / /