Sciweavers

1298 search results - page 81 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 9 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
BMCBI
2006
165views more  BMCBI 2006»
15 years 3 months ago
Validation and functional annotation of expression-based clusters based on gene ontology
Background: The biological interpretation of large-scale gene expression data is one of the paramount challenges in current bioinformatics. In particular, placing the results in t...
Ralf Steuer, Peter Humburg, Joachim Selbig
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 5 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
NIPS
2001
15 years 4 months ago
Constructing Distributed Representations Using Additive Clustering
If the promise of computational modeling is to be fully realized in higherlevel cognitive domains such as language processing, principled methods must be developed to construct th...
Wheeler Ruml
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 3 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...