Sciweavers

1274 search results - page 89 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
CCS
2007
ACM
15 years 6 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
108
Voted
CIKM
2010
Springer
14 years 11 months ago
Partial drift detection using a rule induction framework
The major challenge in mining data streams is the issue of concept drift, the tendency of the underlying data generation process to change over time. In this paper, we propose a g...
Damon Sotoudeh, Aijun An
137
Voted
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 8 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
146
Voted
JIIS
2002
141views more  JIIS 2002»
15 years 9 days ago
Combining Approximation Techniques and Vector Quantization for Adaptable Similarity Search
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining application domains including multimedia, CAD, molecular biology or medica...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...
CIKM
2004
Springer
15 years 6 months ago
Discovering frequently changing structures from historical structural deltas of unordered XML
Recently, a large amount of work has been done in XML data mining. However, we observed that most of the existing works focus on the snapshot XML data, while XML data is dynamic i...
Qiankun Zhao, Sourav S. Bhowmick, Mukesh K. Mohani...