D. Patterson, D. Turner, A. Concepcion, and R. Jr.. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730H. SPIE, (2008)
T. Qian, G. Chen, E. Blasch, R. Jr., and Y. Qi. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730K. SPIE, (2008)
N. Pinkwart, C. Lynch, K. Ashley, and V. Aleven. Intelligent Tutoring Systems, volume 5091 of Lecture Notes in Computer Science, page 90-100. Springer, (2008)
R. Canetti, L. Cheung, D. Kaynar, N. Lynch, and O. Pereira. Theoretical Foundations of Practical Information Security, volume 08491 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)
K. Ashley, C. Lynch, N. Pinkwart, and V. Aleven. JURIX, volume 189 of Frontiers in Artificial Intelligence and Applications, page 1-10. IOS Press, (2008)
N. Pinkwart, V. Aleven, K. Ashley, and C. Lynch. AIED, volume 158 of Frontiers in Artificial Intelligence and Applications, page 101-108. IOS Press, (2007)
V. Aleven, K. Ashley, C. Lynch, and N. Pinkwart. AIED, volume 158 of Frontiers in Artificial Intelligence and Applications, page 713. IOS Press, (2007)
R. Jr., and P. Willett. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657008. SPIE, (2007)