
International Journal of Business Intelligence and Data Mining
2010 Vol.5 No.2
Special Issue: Fourth International Workshop on Dependability Aspects on Data Warehousing and Mining Applications, DAWAM 2009
Guest Editor: Dr. Tho Manh Nguyen
![]() |
Pages | Title and author(s) |
116-133 | Defining and transforming security rules in an MDA approach for DWsCarlos Blanco, Ignacio Garcia-Rodriguez de Guzman, Eduardo Fernandez-Medina, Juan Trujillo, Mario Piattini DOI: 10.1504/IJBIDM.2010.031283 |
134-155 | Practical algorithms for subgroup detection in covert networksNasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi DOI: 10.1504/IJBIDM.2010.031284 |
156-171 | Identifying statistical failure mechanism of web server systems: measurement and reliability analysisT. Fujii, T. Dohi DOI: 10.1504/IJBIDM.2010.031285 |
172-191 | Experimenting with an Intrusion Detection System for Encrypted NetworksVik Tor Goh, Jacob Zimmermann, Mark Looi DOI: 10.1504/IJBIDM.2010.031286 |
Additional paper | |
192-210 | Shape matching through contour extraction using Circular Augmented Rotational Trajectory (CART) algorithmRussel A. Apu, Marina L. Gavrilova DOI: 10.1504/IJBIDM.2010.031287 |