Sciweavers

776 search results - page 44 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
15 years 7 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar
IEEECIT
2006
IEEE
15 years 8 months ago
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks
Localization is a basic and critical requirement for wireless sensor network applications, e.g. target tracking, monitoring and intrusion detection. In the received signal strengt...
Haoran Feng, Ruixi Yuan, Chundi Mu
WEBI
2009
Springer
15 years 8 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
IRI
2008
IEEE
15 years 8 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna