Sciweavers

6318 search results - page 115 / 1264
» Data Leakage Detection
Sort
View
SERSCISA
2009
Springer
15 years 8 months ago
A Deployment Value Model for Intrusion Detection Sensors
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different typ...
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Jo...
IEEEIAS
2008
IEEE
15 years 8 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
DAGSTUHL
2004
15 years 3 months ago
Local Pattern Detection and Clustering
Abstract. The starting point of this work is the definition of local pattern detection given in [10] as the unsupervised detection of local regions with anomalously high data densi...
Frank Höppner
JMLR
2010
153views more  JMLR 2010»
14 years 8 months ago
Feature Extraction for Outlier Detection in High-Dimensional Spaces
This work addresses the problem of feature extraction for boosting the performance of outlier detectors in high-dimensional spaces. Recent years have observed the prominence of mu...
Nguyen Hoang Vu, Vivekanand Gopalkrishnan
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 2 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki