Sciweavers

8 search results - page 2 / 2
» Detecting Insider Attacks Using Non-negative Matrix Factoriz...
Sort
View
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 5 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
NIPS
2008
13 years 6 months ago
Adaptive Template Matching with Shift-Invariant Semi-NMF
How does one extract unknown but stereotypical events that are linearly superimposed within a signal with variable latencies and variable amplitudes? One could think of using temp...
Jonathan Le Roux, Alain de Cheveigné, Lucas...
ACMSE
2005
ACM
13 years 10 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke