Sciweavers

1298 search results - page 1 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ISSA
2004
13 years 6 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
IJCAI
2007
13 years 6 months ago
Computation of Initial Modes for K-modes Clustering Algorithm Using Evidence Accumulation
Clustering accuracy of partitional clustering algorithm for categorical data primarily depends upon the choice of initial data points (modes) to instigate the clustering process. ...
Shehroz S. Khan, Shri Kant
ICDE
1999
IEEE
183views Database» more  ICDE 1999»
14 years 6 months ago
ROCK: A Robust Clustering Algorithm for Categorical Attributes
Clustering, in data mining, is useful to discover distribution patterns in the underlying data. Clustering algorithms usually employ a distance metric based (e.g., euclidean) simi...
Sudipto Guha, Rajeev Rastogi, Kyuseok Shim
SSDBM
2005
IEEE
218views Database» more  SSDBM 2005»
13 years 10 months ago
The "Best K" for Entropy-based Categorical Data Clustering
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has sati...
Keke Chen, Ling Liu
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 3 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang