Sciweavers

6318 search results - page 25 / 1264
» Data Leakage Detection
Sort
View
DAWAK
2003
Springer
15 years 3 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
ISI
2008
Springer
14 years 8 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
SIGMOD
2007
ACM
190views Database» more  SIGMOD 2007»
15 years 10 months ago
XANADUE: a system for detecting changes to XML data in tree-unaware relational databases
Recently, a number of main memory algorithms for detecting the changes to XML data have been proposed. These approaches are not suitable for detecting changes to large XML documen...
Erwin Leonardi, Sourav S. Bhowmick
ICMCS
2007
IEEE
190views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Video Event Detection with Combined Distance-Based and Rule-Based Data Mining Techniques
In this paper, the rare event detection issue in video event detection is addressed through the proposed data mining framework which can be generalized to be domain independent. T...
Zongxing Xie, Mei-Ling Shyu, Shu-Ching Chen
ACSC
2005
IEEE
15 years 3 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie