Sciweavers

6318 search results - page 31 / 1264
» Data Leakage Detection
Sort
View
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
15 years 10 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
15 years 11 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...
ANLP
2000
92views more  ANLP 2000»
14 years 11 months ago
Detecting Errors within a Corpus using Anomaly Detection
We present a method for automatically detecting errors in a manually marked corpus using anomaly detection. Anomaly detection is a method for determining which elements of a large...
Eleazar Eskin
TSP
2008
87views more  TSP 2008»
14 years 9 months ago
Joint Data Detection and Channel Tracking for OFDM Systems With Phase Noise
This paper addresses the problem of data detection in orthogonal frequency division multiplexing (OFDM) systems operating under a time-varying multipath fading channel. Optimal det...
Stelios Stefanatos, Aggelos K. Katsaggelos