-
Research and Teaching of Professor Uwe Aickelin
Danger Theory

www.aickelin.com - 2009-02-04
-
... helping you transform data into knowledge Effective data mining tools that construct classifiers See5/C5.0 2.06 --> build numerical models Cubist 2.05 --> ...
www.rulequest.com - 2009-02-07
-
RED LAMBDA is a leader in the development of collaborative grid technology - a fusion of traditional grid computing and P2P - for use in distributed computing ...
www.cgrid.net - 2009-02-14
-
Securify solutions deliver real-time visibility and control of network relationships and behavior between users and critical business systems. Securify uniquely ...
behavior on critical systems

control based

control-driven security

controls-driven

identity-aware

insider behavior

securvantage

www.securify.com - 2009-02-13
-
Weinman GeoScience provides expert consulting, seismic data processing, geophysical, geological, and engineering services to the energy industry.
3D AVO

3D Kirchhoff

3D reservoir parameter

3D volume

3D volume interpretation

accurate calibration

acquisition geometry

amplitude anomalies

amplitude anomaly

anellipticity

anomaly acquisition

anomaly risking

anomaly validation

anomaly visualization

AVO angle detection

AVO attribute volume

www.weinmangeoscience.com - 2009-02-07
-
Scianta Intelligence provides web-enabled business intelligence systems and software solutions. The Scianta Intelligence Factory, integrates user interface ...
adaptive intelligence platform

fuzzySQL

intelligence factory

www.scianta.com - 2009-02-07
-
Nowell Shalom protects against insider threats and identity theft using host based anomaly detection and intelligent multifactor authentication. Spyforce ...
nowellgroup.com - 2009-03-05
-
NetFort LANGuardian is an all-in-one network behavior analysis solution, providing visibility of internal security and operational network activity by user, ...
LANGuardian

www.netforttechnologies.com - 2009-02-13
-
Security For Command and Conquer . c&c team
Authetication

Binary Girl

c&c team

cnc team

gary hat

h4cnc

hacker cNc

pirate digital

s4cnc

totrials

Vulnurability

whith hat

www.s4cnc.com - 2009-02-09
-
PWI provides specialized software technologies and advanced solutions in IT security, enterprise messaging, analytics and custom software development. Led by ...
adaptive security engine

anomaly intelligence

endpoint firewal

security information analysis

www.pwicorp.com - 2009-02-07