Sciweavers

345 search results - page 1 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
IJNSEC
2010
112views more  IJNSEC 2010»
12 years 11 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
ICDM
2005
IEEE
199views Data Mining» more  ICDM 2005»
13 years 10 months ago
CoLe: A Cooperative Data Mining Approach and Its Application to Early Diabetes Detection
We present CoLe, a cooperative data mining approach for discovering hybrid knowledge. It employs multiple different data mining algorithms, and combines results from them to enhan...
Jie Gao, Jörg Denzinger, Robert C. James
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 7 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
KDD
2012
ACM
235views Data Mining» more  KDD 2012»
11 years 7 months ago
A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data
Outlier mining in d-dimensional point sets is a fundamental and well studied data mining task due to its variety of applications. Most such applications arise in high-dimensional ...
Ninh Pham, Rasmus Pagh
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 2 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han