Sciweavers

158 search results - page 32 / 32
» Evaluation Patterns for Analyzing the Costs of Enterprise In...
Sort
View
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
14 years 17 days ago
Clustering event logs using iterative partitioning
The importance of event logs, as a source of information in systems and network management cannot be overemphasized. With the ever increasing size and complexity of today’s even...
Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangel...
WEBDB
2009
Springer
149views Database» more  WEBDB 2009»
14 years 11 days ago
Extracting Route Directions from Web Pages
Linguists and geographers are more and more interested in route direction documents because they contain interesting motion descriptions and language patterns. A large number of s...
Xiao Zhang, Prasenjit Mitra, Sen Xu, Anuj R. Jaisw...
ESORICS
2004
Springer
13 years 11 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee