Sciweavers

2032 search results - page 272 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
128
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
109
Voted
IDEAL
2005
Springer
15 years 8 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
133
Voted
KDD
2005
ACM
117views Data Mining» more  KDD 2005»
16 years 3 months ago
Rule extraction from linear support vector machines
We describe an algorithm for converting linear support vector machines and any other arbitrary hyperplane-based linear classifiers into a set of non-overlapping rules that, unlike...
Glenn Fung, Sathyakama Sandilya, R. Bharat Rao
KDD
2007
ACM
138views Data Mining» more  KDD 2007»
15 years 8 months ago
High-quantile modeling for customer wallet estimation and other applications
In this paper we discuss the important practical problem of customer wallet estimation, i.e., estimation of potential spending by customers (rather than their expected spending). ...
Claudia Perlich, Saharon Rosset, Richard D. Lawren...
109
Voted
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 3 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider