Selected papers of the MSSA/IMACS 9th Biennial conference on Modeling and simulation
Algorithms for approximate graph matching
Information Sciences—Informatics and Computer Science: An International Journal
An Algorithm for Finding the Largest Approximately Common Substructures of Two Trees
IEEE Transactions on Pattern Analysis and Machine Intelligence
Identifying consensus of trees through alignment
Information Sciences—Informatics and Computer Science: An International Journal
Algorithmics and applications of tree and graph searching
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
IEEE Intelligent Systems
ATreeGrep: Approximate Searching in Unordered Trees
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Snort 2.0 Intrusion Detection
Unordered Tree Mining with Applications to Phylogeny
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Structural and algorithmic aspects of massive social networks
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
Phylogenetic Networks: Modeling, Reconstructibility, and Accuracy
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
Data Mining in Bioinformatics
Hi-index | 0.00 |
While some researchers have exploited the similarity between cyber attacks and epidemics we believe there is also potential to leverage considerable experience gained in other biological domains: phylogenetics, ecological niche modeling, and biomonitoring. Here we describe some new ideas for threat detection from biomonitoring, and approximate graph searching and matching for cross network aggregation. Generic anomaly aggregation systems using these methods could detect and model the inheritance and evolution of vulnerability and threats across multiple domains and time scales.