Sciweavers

6318 search results - page 119 / 1264
» Data Leakage Detection
Sort
View
KDD
1998
ACM
185views Data Mining» more  KDD 1998»
15 years 6 months ago
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection
Verylarge databases with skewedclass distributions and non-unlformcost per error are not uncommonin real-world data mining tasks. Wedevised a multi-classifier meta-learningapproac...
Philip K. Chan, Salvatore J. Stolfo
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
15 years 8 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 2 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
ACSAC
2003
IEEE
15 years 7 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
IAT
2010
IEEE
14 years 12 months ago
Semi-supervised Learning for Opinion Detection
Research on opinion detection has shown that a large number of opinion-labeled data are necessary for capturing subtle opinions. However, opinion-labeled data, especially at the su...
Ning Yu, Sandra Kübler