Sciweavers

6318 search results - page 36 / 1264
» Data Leakage Detection
Sort
View
LWA
2008
15 years 1 months ago
Towards Burst Detection for Non-Stationary Stream Data
Detecting bursts in data streams is an important and challenging task, especially in stock market, traffic control or sensor network streams. Burst detection means the identificat...
Daniel Klan, Marcel Karnstedt, Christian Pöli...
CORR
2010
Springer
151views Education» more  CORR 2010»
14 years 10 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
15 years 4 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
15 years 6 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
ICRA
2005
IEEE
258views Robotics» more  ICRA 2005»
15 years 5 months ago
Fast Line, Arc/Circle and Leg Detection from Laser Scan Data in a Player Driver
— A feature detection system has been developed for real-time identification of lines, circles and people legs from laser range data. A new method suitable for arc/circle detect...
João Xavier, Marco Pacheco, Daniel Castro, ...