Sciweavers

1274 search results - page 80 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
15 years 7 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...
92
Voted
LREC
2010
150views Education» more  LREC 2010»
15 years 2 months ago
Detection of Peculiar Examples using LOF and One Class SVM
This paper proposes the method to detect peculiar examples of the target word from a corpus. The peculiar example is regarded as an outlier in the given example set. Therefore we ...
Hiroyuki Shinnou, Minoru Sasaki
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
16 years 1 months ago
iSAX: indexing and mining terabyte sized time series
Current research in indexing and mining time series data has produced many interesting algorithms and representations. However, it has not led to algorithms that can scale to the ...
Jin Shieh, Eamonn J. Keogh
CORR
2011
Springer
239views Education» more  CORR 2011»
14 years 7 months ago
From Linked Data to Relevant Data -- Time is the Essence
The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data...
Markus Kirchberg, Ryan K. L. Ko, Bu Sung Lee
CCS
2006
ACM
15 years 4 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...