Sciweavers

6318 search results - page 47 / 1264
» Data Leakage Detection
Sort
View
KDD
2003
ACM
192views Data Mining» more  KDD 2003»
16 years 8 days ago
Efficient elastic burst detection in data streams
Burst detection is the activity of finding abnormal aggregates in data streams. Such aggregates are based on sliding windows over data streams. In some applications, we want to mo...
Yunyue Zhu, Dennis Shasha
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ICDCS
2012
IEEE
13 years 2 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
PAKDD
2005
ACM
146views Data Mining» more  PAKDD 2005»
15 years 5 months ago
An Incremental Data Stream Clustering Algorithm Based on Dense Units Detection
Abstract. The data stream model of computation is often used for analyzing huge volumes of continuously arriving data. In this paper, we present a novel algorithm called DUCstream ...
Jing Gao, Jianzhong Li, Zhaogong Zhang, Pang-Ning ...
IM
2007
15 years 1 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle