Sciweavers

1186 search results - page 154 / 238
» A New Approach to Secure Logging
Sort
View
162
Voted
DASC
2006
IEEE
15 years 6 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
WAIM
2004
Springer
15 years 6 months ago
Mining Web Sequential Patterns Incrementally with Revised PLWAP Tree
Since point and click at web pages generate continuous data stream, which flow into web log data, old patterns may be stale and need to be updated. Algorithms for mining web seque...
Christie I. Ezeife, Min Chen
106
Voted
CIKM
2003
Springer
15 years 6 months ago
Using titles and category names from editor-driven taxonomies for automatic evaluation
Evaluation of IR systems has always been difficult because of the need for manually assessed relevance judgments. The advent of large editor-driven taxonomies on the web opens the...
Steven M. Beitzel, Eric C. Jensen, Abdur Chowdhury...
97
Voted
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
15 years 5 months ago
User-Driven Navigation Pattern Discovery from Internet Data
Managers of electronic commerce sites need to learn as much as possible about their customers and those browsing their virtual premises, in order to maximise the return on marketin...
Matthias Baumgarten, Alex G. Büchner, Sarabjo...
NIPS
2008
15 years 2 months ago
Online Metric Learning and Fast Similarity Search
Metric learning algorithms can provide useful distance functions for a variety of domains, and recent work has shown good accuracy for problems where the learner can access all di...
Prateek Jain, Brian Kulis, Inderjit S. Dhillon, Kr...