Sciweavers

70 search results - page 3 / 14
» An intelligent PE-malware detection system based on associat...
Sort
View
IEEEIAS
2009
IEEE
14 years 19 days ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
SGAI
2007
Springer
14 years 3 days ago
Dynamic Rule Mining for Argumentation Based Systems
Argumentation has proved to be a very influential reasoning mechanism particularly in the context of multi agent systems. In this paper we introduce PADUA (Protocol for Argumenta...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
KDD
2002
ACM
149views Data Mining» more  KDD 2002»
14 years 6 months ago
A system for real-time competitive market intelligence
A method is described for real-time market intelligence and competitive analysis. News stories are collected online for a designated group of companies. The goal is to detect crit...
Sholom M. Weiss, Naval K. Verma
CSREASAM
2006
13 years 7 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 8 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...