Sciweavers

90 search results - page 9 / 18
» Capturing the spatio-temporal behavior of real traffic data
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ISI
2008
Springer
14 years 9 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
120
Voted
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
15 years 10 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
88
Voted
ICTAI
2007
IEEE
15 years 4 months ago
An Adaptive Distributed Ensemble Approach to Mine Concept-Drifting Data Streams
An adaptive boosting ensemble algorithm for classifying homogeneous distributed data streams is presented. The method builds an ensemble of classifiers by using Genetic Programmi...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
IJCAI
2001
14 years 11 months ago
Probabilistic Classification and Clustering in Relational Data
Supervised and unsupervised learning methods have traditionally focused on data consisting of independent instances of a single type. However, many real-world domains are best des...
Benjamin Taskar, Eran Segal, Daphne Koller