#### Filter Results:

- Full text PDF available (15)

#### Publication Year

1969

2017

- This year (1)
- Last 5 years (1)
- Last 10 years (6)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Bon K. Sy
- AAAI
- 1992

Finding the I Most Probable IJxplanations (MPE) of a given evidence, Se, in a Bayesian belief network is a process to identify and order a set of composite hypotheses, His, of which the posteriorâ€¦ (More)

- Bon K. Sy
- Information Fusion
- 2009

The objective of this research is to show an analytical intrusion detection framework (AIDF) comprised of (i) a probability model discovery approach, and (ii) a probabilistic inference mechanism forâ€¦ (More)

- Bon K. Sy
- Int. J. Approx. Reasoning
- 1993

Finding the l Most Probable Explanations (MPE) of a given evidence, S e , in a Bayesian belief network can be formulated as identifying and ordering a set of composite hypotheses, H i s, of which theâ€¦ (More)

- Bon K. Sy
- MLDM
- 2005

This research presents a data mining technique for discovering masquerader intrusion. User/system access data are used as a basis for deriving statistically significant event patterns. These patternsâ€¦ (More)

- Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan
- 2010 Eighth International Conference on Privacyâ€¦
- 2010

This paper presents the design and development of a technique referred to as SIPPA - Secure Information Processing with Privacy Assurance - for biometric data reconstruction. SIPPA enables aâ€¦ (More)

- Bon K. Sy
- IJCAI
- 1989

Ordering composite hypotheses in a Bayesian network based on its associated a posteriori probabilities can be exponentially hard. This paper discusses a qualitative reasoning approach which reducesâ€¦ (More)

- Bon K. Sy, John R. Deller
- IEEE Trans. Systems, Man, and Cybernetics
- 1988

- Arun P. Kumara Krishan, Bon K. Sy, Adam Ramirez
- 2012

A biometric system may be viewed as a composition of various segments; i.e., unit(s) capturing biometric samples, unit(s) preprocessing captured samples into formats from which biometric data can beâ€¦ (More)

- Arun Prakash, Kumara Krishnan, Bon K. Sy
- 2012 Tenth Annual International Conference onâ€¦
- 2012

We present a two-party secure information processing protocol referred to as SIPPA-2.0 - targeted towards privacy preserving biometric data comparison and reconstruction. The original intention ofâ€¦ (More)

- Bon K. Sy
- Annals of Mathematics and Artificial Intelligence
- 1993

A Bayesian network is a knowledge representation framework for encoding both qualitative and quantitative probabilistic dependencies among a set of propositional (or random) variables. An importantâ€¦ (More)